Q: 2
The cybersecurity team must create a resilient security plan to address threats. To accomplish this,
the threat intelligence team performed a thorough analysis of the A .R.T.I.E. threat landscape. The
result was a list of vulnerabilities such as social engineering, zero-day exploits, ransomware, phishing
emails, outsourced infrastructure, and insider threats.
Using the information in the case study and the scenario for this question, which vulnerability type
exposes the data and infrastructure of A.R.T.I.E .?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.