Sound the Alarm: Detection and Response | Weekly challenge 2 Quiz |
What tactic do malicious actors use to maintain and expand unauthorized access into a network?
- Exfiltration
- Data size reduction
- Phishing
- Lateral movement
Sound the Alarm: Detection and Response | Weekly challenge 2 Quiz |
What tactic do malicious actors use to maintain and expand unauthorized access into a network?