During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?
A . Long-term latency and key data collection.
B . Leaks key data information to interested third parties.
C . By phishing emails, attachments carrying a 0day vulnerability cause the user’s terminal to become a springboard for attacks.
D . The attacker sends C&C attack or other remote command to the infected host, cause the attack to spread horizontally across the intranet.
Answer: D