After analyzing and correlating activity from multiple sensors, the security administrator has determined that a group of very well organized individuals from an enemy country is responsible for various attempts to breach the company network, through the use of very sophisticated and targeted attacks. Which of the following is this an example of?

A. Privilege escalation
B. Advanced persistent threat
C. Malicious insider threat
D. Spear phishing


Answer: B. Advanced persistent threat

Computer Science & Information Technology

You might also like to view...

P426 is an example of a PID

Indicate whether the statement is true or false

Computer Science & Information Technology

Draw the truth table of a full subtractor that directly subtracts bit A from B together with a borrow?in, to produce a difference D and a borrow?out.

What will be an ideal response?

Computer Science & Information Technology

Browser cookies are dangerous because they ________.

A. may contain sensitive private information about you and allow a website to track what pages you have visited B. allow a website to track what pages you have visited C. may contain sensitive private information about you D. taste bad

Computer Science & Information Technology

AVERAGE is an example of a ________ function.

a. logical b. statistical c. navigation d. summary

Computer Science & Information Technology