[TABS_R id=13309]
A disgruntled employee decides to leak critical information about a company’s new product. The employee places keyloggers on the department’s computers, allowing the information to be sent out to the Internet. Which of the following attacks is occurring?
- Man-in-the-middle
- Logic bomb
- Insider threat
- Social engineering
[TABS_R id=13309]