The security team of a major government agency discovers a breach involving employee data that has been leaked outside the agency. They discover that a software developer for the agency transferred employee data from a secure primary system to a secondary system, for the purpose of software development and testing. This secondary system was the target of a hacker. Which type of breach source(s) is this?
malicious insider and cybercriminal
cybercriminal and well-meaning insider
well-meaning insider only
Want to practice for ST0-095 - Symantec Technical Foundations: Security Solutions 1.0 (STS) ?