An attacker has determined the best way to impact operations is to in ltrate third-party software vendors. Which of the following vectors is being exploited? A. Social media B. Cloud C. Supply chain D. Social Engineering Correct Answer: C This question is in SY0-601 exam For getting CompTIA Security+ certificate
Please login or Register to submit your answer