View all questions & answers for the SY0-701 exam
Which of the following would most likely be used by attackers to perform credential harvesting?
Social engineering
Supply chain compromise
Third-party software
Rainbow table
Submit