Certification Practice Exams with Real Test Questions & Answers

After analyzing and correlating activity eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for after analyzing and correlating activity from the firewall logs, server logs, and the intrusion detection system logs, a cybersecurity

Full Certification Question

After analyzing and correlating activity from the firewall logs, server logs, and the intrusion detection system logs, a cybersecurity analyst has determined that a sophisticated breach of the company’s network security may have occurred from a group of specialized attackers in a foreign country over the past five months. Up until now, these cyberattacks against the company network had gone unnoticed by the company’s information security team. How would you best classify this threat?