What is the second stage of an Advanced Persistent Threat (APT) attack?
Exfiltration
Incursion
Discovery
Capture
Submit