PdfPrep.com

Which category as defined in the Diamond Model of Intrusion does this activity fall under?

A user on your network receives an email in their mailbox that contains a malicious attachment.

There is no indication that the file was run.

Which category as defined in the Diamond Model of Intrusion does this activity fall under?
A . reconnaissance
B . weaponization
C . delivery
D . installation

Answer: C

Exit mobile version