A user received a malicious attachment but did not run it.
Which category classifies the intrusion?
A. weaponization
B. reconnaissance
C. installation
D. delivery
A user received a malicious attachment but did not run it.
Which category classifies the intrusion?
A. weaponization
B. reconnaissance
C. installation
D. delivery