0
________ is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.

Open 1 Answers 3803 Views Technology
________ is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.

Attack Trajectory

Line of attack

Attack Strategy

Chain of attack

1 Answer

0
________ is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.

Attack Trajectory

Line of attack

Attack Strategy

Chain of attack
by (280k points)
...