A disgruntled employee copies confidential design documents from the company file server and uploads them to a personal Dropbox account so they can later sell the information to a competitor. Which of the following BEST describes this activity?
This scenario is an example of data exfiltration. The employee is an insider threat who is deliberately transferring sensitive company information to an external location without authorization. SQL injection, privilege escalation, and typosquatting are unrelated attack techniques and do not accurately describe the act of stealing and transferring data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.