Which of the following attack vectors was exploited to install the hardware?

After returning from a conference, a user’s laptop has been operating slower than normal and overheating, and the fans have been running constantly. During the diagnosis process, an unknown piece of hardware is found connected to the laptop’s motherboard .

Which of the following attack vectors was exploited to install the hardware?
A . Removable media
B. Spear phishing
C. Supply chain
D. Direct access

Answer: D

Latest SY0-601 Dumps Valid Version with 396 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments