Choose the odd one out based on the stages in the Cyber Kill Chain model. (Choose the most appropriate)

Lateral movement

Data exfiltration

Crypto-mining

Username enumeration

Correct Option - d

To get all Infosys Certified Security Operation Center Associate Exam questions Join Group https://bit.ly/infy_premium_group

We're passionate about offering best placement materials and courses!! A one stop place for Placement Materials. We daily post Offcampus updates and Placement Materials.

Qtr No. 213, New Town Yehlanka Indore 454775

admin@prepflix.in