A user received a malicious attachment but did not run it. Which category classifies the intrusion?
A. weaponization
B. reconnaissance
C. installation
D. delivery
A user received a malicious attachment but did not run it. Which category classifies the intrusion?
A. weaponization
B. reconnaissance
C. installation
D. delivery