Assets, Threats, and Vulnerabilities | Weekly challenge 3 Quiz |
A project manager at a utility company receives a suspicious email that contains a file attachment. They open the attachment and it installs malicious software on their laptop.
What are the attack vectors used in this situation? Select two answers.
- The infected workstation
- The suspicious email
- The file attachment
- The malicious software