You work as a Network Security Administrator for NetPerfect Inc. The company has a
Windowsbased network. You are incharge of the data and network security of the company. While
performing a threat log analysis, you observe that one of the database administrators is pilfering
confidential data. What type of threat is this?
A.
Malware
B.
External threat
C.
Internal threat
D.
Zombie
Explanation: