A security analyst observed the following activities in chronological order:
1. Protocol violation alerts on external firewall
2. Unauthorized internal scanning activity
3. Changes in outbound network performance
Which of the following best describes the goal of the threat actor?
gomet2000
Highly Voted 10 months, 2 weeks agoDrZoidBergsClaws
Most Recent 10 months, 4 weeks agovoiddraco
10 months, 3 weeks ago