Vocabulary Word
Scenario:
I'm seeing some suspicious network activity. It looks like someone is trying to breach our security protocols.
Response:
There may be a surreptitious attempt to breech our data. I'll start a deep-dive analysis.
Scenario:
We need some candid photos for this piece. Can you get some without disrupting the event?
Response:
Absolutely, I can capture surreptitious photos to complement the candid nature of the piece.