A network administrator identifies sensitive files being transferred from a workstation in the LAN to
an unauthorized outside IP address in a foreign country. An investigation determines that the
firewall has not been altered, and antivirus is up-to-date on the workstation. Which of the following
is the MOST likely reason for the incident?
A.
MAC Spoofing
B.
Session Hijacking
C.
Impersonation
D.
Zero-day