After analyzing and correlating activity from multiple sensors, the security administrator has
determined that a group of very well organized individuals from an enemy country is
responsible for various attempts to breach the company network, through the use of very
sophisticated and targeted attacks. Which of the following is this an example of?
A.
Privilege escalation
B.
Advanced persistent threat
C.
Malicious insider threat
D.
Spear phishing