0 votes
in End Point Security by
________ is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.

Select the correct answer from below options:

a) Attack Strategy

b) Chain of attack

c) Attack Trajectory

d) Line of attack

1 Answer

0 votes
by
b) Chain of attack is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.

Related questions

0 votes
asked Feb 17, 2022 in End Point Security by sharadyadav1986
+2 votes
asked Jan 28, 2020 in Cybersecurity Prologue by AdilsonLima
...