Gwen is investigating a security incident. She discovered evidence that the attacker obtained a sensitive file and sent it to a cloud service. What stage of the attack does this evidence address?

What will be an ideal response?

Exfiltration

Computer Science & Information Technology

You might also like to view...

The signature option with an e-mail may include all of the following EXCEPT ________

A) name, address, and phone number B) your account name and password C) a quotation D) personal e-mail address

Computer Science & Information Technology

What do important elements of peer-to-peer computing in Windows 7 (and Windows Server 2008) include?

What will be an ideal response?

Computer Science & Information Technology