Rashid has been working with his customer to iscc video
cc video for rashid has been working with his customer to understand the Indication of Compromise (IoC) that they have seen within their Security Information
            Question 1
            Be Honest
          
          
        Answer
          Full Certification Question
Rashid has been working with his customer to understand the Indication of Compromise (IoC) that they have seen within their Security Information and Event Manager (SIEM). The logs show that a bad actor infiltrated their organization through a phishing email. Once the bad actor was in, they traversed the network till they gained access to a firewall. Once they were in the firewall, the bad actor assumed the role the firewall had to access the database. The database was then copied by the bad actor. This is an example of which type of threat?