A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property.
What is the threat agent in this situation?
A . the intellectual property that was stolen
B . the defense contractor who stored the intellectual property
C . the method used to conduct the attack
D . the foreign government that conducted the attack
Answer: D