While reviewing firewall logs, a security analyst at a military contractor notices a sharp rise in activity from a foreign domain known to have well-funded groups that specifically target the companyâ’s R&D department. Historical data reveals other corporate assets were previously targeted. This evidence MOST likely describes:
A. an APT.
B. DNS harvesting.
C. a zero-day exploit.
D. corporate espionage.