A malicious attacker has compromised a database by implementing a Python-based script that will automatically establish an SSH connection daily between the hours of 2:00 am and 5:00 am. Which of the following is the MOST common motive for the attack vector that was used?
Dustin
2 months agoAlexia
22 days agoGeoffrey
24 days agoAhmed
29 days agoVallie
2 months agoVi
2 months agoArdella
24 days agoEladia
26 days agoJoanne
28 days agoJohanna
1 months agoArlette
1 months agoGiuseppe
2 months agoJeanice
2 months agoBrittney
1 months agoFrederica
1 months agoWhitley
2 months agoFelicidad
2 months agoTimmy
3 months agoAnnalee
3 months agoArtie
3 months ago