Answer:
Option b (remain unnoticed so they can continue to steal data) is the right approach.
Step-by-step explanation:
- APT seems to be sustained but instead designed to target coordinated attack whereby an attacker achieves network access including a longer length of time impossible to conceive.
- Usually, APT assaults become targeted at organizations throughout fields including such national security, engineering, as well as the financial services industry, as they make increased-value details.
There are 3 other possibilities not relevant to just the given case. So that the option here was the right one.