List of questions
Related questions
Question 547 - SY0-601 discussion
Which of the following threat vectors would appear to be the most legitimate when used by a malicious actor to impersonate a company?
A.
Phone call
B.
Instant message
C.
Email
D.
Text message
Your answer:
0 comments
Sorted by
Leave a comment first