Which three options are attack vectors of the threat-centric defense? (Choose three.)

Which three options are attack vectors of the threat-centric defense? (Choose three.)
A . Linux OS
B . email
C . web
D . cloud apps
E . DNS security
F . voicemail

Answer: BCE

Explanation:

Provide security across more attack vectors C network, endpoint, mobile, virtual, email, and web

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments