header bg

Scan QR code or get instant email to install app


Which of the following attack techniques is used by John in the case:
As a professional hacker John conducts a network assault on a well-known organization and gets illegal access to the target network. He remains on the network for a long time without being recognized and gathers important information without damaging the organization.

A Advanced persistent

Related Information


Leave a Reply

Your email address will not be published. Required fields are marked *