Which two methods are used by threat actors to compromise your device when conducting phishing campaigns? (Choose two.)
Select one or more:

An attachment to an email
An infected thumb drive
Click bait
An embedded hyperlink within an email

  Discussion forum

Question
0

Leave an answer