Which stage of an Advanced Persistent Threat (APT) attack does social engineering occur?
Capture
Incursion
Discovery
Exfiltration
Submit