John, a professional hacker, performs a network attack on a renowed organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time to obtains sensitive information without sabotaging the organization. Which of the following attack techniques is used by John?
John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time to obtains sensitive information without sabotaging the organization. Which of the following attack techniques is used by John? Option 1 : Diversion theft Option 2 : Spear-phishing sites Option 3 : Insider threat Option 4 : Advanced persistent threat 1. Diversion theft Diversion …