Prévia do material em texto
Knowledge Check Which three attack vectors are typically used during the exploitation stage of a cyberattack? (Choose three.) Phishing Spearphishing Whale phishing Distributed denial-of-service (DDoS) Ransomware Review the question and answers. Click Next to continue.