View all questions & answers for the CC exam
Methods or mechanisms cybercriminals use to gain illegal, unauthorized access to computer systems and networks.
Attacker
Threat Vector
Threat
Threat actor
Submit