A project manager at a utility company receives a suspicious email that contains a file attachment. They open the attachment and it installs malicious software on their laptop.

Assets, Threats, and Vulnerabilities | Weekly challenge 3 Quiz | 

A project manager at a utility company receives a suspicious email that contains a file attachment. They open the attachment and it installs malicious software on their laptop.

What are the attack vectors used in this situation? Select two answers.

  • The infected workstation
  • The suspicious email
  • The file attachment
  • The malicious software

 

Leave a Comment