[TABS_R id=6660]
When an email with a malicious attachment is delivered to a mailbox, what step in the Cyber Kill Chain framework has occurred?
- Reconnaissance
- Exploitation
- Weaponization
- Delivery
[TABS_R id=6660]
Post Questions & Answers
[TABS_R id=6660]
[TABS_R id=6660]