The technique used by an attacker to gain access to another device may be broadly termed as __________.
Select the correct answer from below list:
a) Threat
b) .Attack
c) Attack Vector
d) Attack Strategy