Implementing Cisco Network Security (IINS v3.0) (#41)

Your security team has discovered a malicious program that has been harvesting the CEO’s email messages and the company's user database for the last 6 months. What are two possible types of attacks your team discovered? (Choose two.)

social activism
Polymorphic Virus
advanced persistent threat
drive-by spyware
targeted malware