A user on your network receives an email in their mailbox that contains a malicious attachment.
There is no indication that the file was run.
Which category as defined in the Diamond Model of Intrusion does this activity fall under?
A . reconnaissance
B . weaponization
C . delivery
D . installation
Answer: C