What is the primary goal of the "defensive evasion" tactic in the context of cyber attacks?

(Select The Best Answer)