AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: After analyzing and correlating activity eccouncil video

Question 1
« Back   Next eccouncil Cloud ethical-hacker Question »

Full Certification Question

After analyzing and correlating activity from the firewall logs, server logs, and the intrusion detection system logs, a cybersecurity analyst has determined that a sophisticated breach of the company’s network security may have occurred from a group of specialized attackers in a foreign country over the past five months. Up until now, these cyberattacks against the company network had gone unnoticed by the company’s information security team. How would you best classify this threat?