Which three options are attack vectors of the threat-centric defense? (Choose three.)
Which three options are attack vectors of the threat-centric defense? (Choose three.)
A . Linux OS
B . email
C . web
D . cloud apps
E . DNS security
F . voicemail
Answer: BCE
Explanation:
Provide security across more attack vectors C network, endpoint, mobile, virtual, email, and web
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments