Sound the Alarm: Detection and Response | Weekly challenge 2 Quiz |
What type of attack involves the unauthorized transmission of data from a system?
- Data leak
- Packet classification
- Data exfiltration
- Packet crafting
Sound the Alarm: Detection and Response | Weekly challenge 2 Quiz |
What type of attack involves the unauthorized transmission of data from a system?