After analyzing and correlating activity eccouncil video
ethical-hacker video for after analyzing and correlating activity from the firewall logs, server logs, and the intrusion detection system logs, a cybersecurity
Answer
          Full Certification Question
After analyzing and correlating activity from the firewall logs, server logs, and the intrusion detection system logs, a cybersecurity analyst has determined that a sophisticated breach of the company’s network security may have occurred from a group of specialized attackers in a foreign country over the past five months. Up until now, these cyberattacks against the company network had gone unnoticed by the company’s information security team. How would you best classify this threat?