Watch this video on YouTube
An organization is building out network traffic analysis capabilities that use anomaly detection to identify ongoing attacks. At which stage of the lifecycle of a data exfiltration attack is this solution LEAST likely to identify a threat?