اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 381 من 448

كل الأسئلة

John, a professional hacker, gains unauthorized access to a renowned organization’s network and stays there for a long time without being detected, quietly stealing sensitive information without sabotaging systems. Which attack technique is John using?

الخيارات

  • A Advanced persistent theft
  • B Diversion theft
  • C Spear-phishing sites
  • D Insider threat

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.