Symantec Endpoint Security Complete - R2 Technical Specialist 250-580 Question # 40 Topic 5 Discussion

Symantec Endpoint Security Complete - R2 Technical Specialist 250-580 Question # 40 Topic 5 Discussion

250-580 Exam Topic 5 Question 40 Discussion:
Question #: 40
Topic #: 5

Which security threat stage seeks to gather valuable data and upload it to a compromised system?


A.

Exfiltration


B.

Impact


C.

Lateral Movement


D.

Command and Control


Get Premium 250-580 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.