List of questions
Related questions
Question 319 - SY0-701 discussion
Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?
A.
Unidentified removable devices
B.
Default network device credentials
C.
Spear phishing emails
D.
Impersonation of business units through typosquatting
Your answer:
0 comments
Sorted by
Leave a comment first