in Technology by (1.9m points)
________ is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.

Attack Trajectory

Line of attack

Attack Strategy

Chain of attack

1 Answer

0 votes
by (1.9m points)
________ is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.

Attack Trajectory

Line of attack

Attack Strategy

Chain of attack

Related questions

0 votes
asked Oct 11, 2021 in Education by JackTerrance (1.9m points)
0 votes
asked Oct 25, 2020 in Technology by JackTerrance (1.9m points)
...