After investigating repeated unauthorized access attempts at a tech lab, incident responders discovered remote sessions from multiple foreign IP spaces consistently retrieving confidential project files. Which primary factor explains the aggressors’ actions?
They seek to disrupt a beneficial community program for publicity
They plan to replicate cutting-edge designs to gain an industrial lead
They intend to gather user data for charity-related campaigns
They aim to undermine the facility’s reputation through a public scandal
Seeking an industrial lead by collecting proprietary data aligns with the pattern of repeated data retrieval from foreign sources, suggesting an intense drive to obtain designs or plans for competitive benefits. Damaging a philanthropic event, tarnishing the lab’s public image, or pursuing donations for charitable endeavors do not logically connect with the effort invested in extracting sensitive research information.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is proprietary data?
Open an interactive chat with Bash
How can foreign IP spaces be used in cyberattacks?