header bg


Which of the following attack techniques is used by John in the case:
As a professional hacker John conducts a network assault on a well-known organization and gets illegal access to the target network. He remains on the network for a long time without being recognized and gathers important information without damaging the organization.

A Advanced persistent