header bg

Scan QR code or get instant email to install app

Question:

Which of the following attack techniques is used by John in the case:
As a professional hacker John conducts a network assault on a well-known organization and gets illegal access to the target network. He remains on the network for a long time without being recognized and gathers important information without damaging the organization.

A Advanced persistent
explanation

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*