Posted by: Pdfprep
Post Date: December 24, 2020
A user on your network receives an email in their mailbox that contains a malicious attachment.
There is no indication that the file was run.
Which category as defined in the Diamond Model of Intrusion does this activity fall under?
A . reconnaissance
B . weaponization
C . delivery
D . installation
Answer: C
Leave a Reply