Gwen is investigating a security incident. She discovered evidence that the attacker obtained a sensitive file and sent it to a cloud service. What stage of the attack does this evidence address?
What will be an ideal response?
Exfiltration
Computer Science & Information Technology
You might also like to view...
The signature option with an e-mail may include all of the following EXCEPT ________
A) name, address, and phone number B) your account name and password C) a quotation D) personal e-mail address
Computer Science & Information Technology
What do important elements of peer-to-peer computing in Windows 7 (and Windows Server 2008) include?
What will be an ideal response?
Computer Science & Information Technology