An attacker has determined the best way to impact operations is to in ltrate third-party software vendors. Which of the following vectors is being exploited?

QuestionsCategory: SY0-601An attacker has determined the best way to impact operations is to in ltrate third-party software vendors. Which of the following vectors is being exploited?
Admin Staff asked 12 months ago
An attacker has determined the best way to impact operations is to in ltrate third-party software vendors. Which of the following vectors is being exploited?

A. Social media

B. Cloud

C. Supply chain

D. Social Engineering





 

Correct Answer: C

This question is in SY0-601 exam
For getting CompTIA Security+ certificate


Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.