John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization.
Which of the following attack techniques is used by John?
Kamal_SriLanka
Highly Voted 2Â years, 6Â months agoCokamaniako
Most Recent 11Â months, 2Â weeks agoDaniel8660
1Â year, 3Â months agoANDRESCB1988
2Â years, 5Â months ago