What are source methods involved in creating the security incidents?

Email (example: phishing) & Loss or Theft of Equipment
Web (e.g. drive-by download) & Malware (e.g. virus,trojan,etc.)
By External/Removable Media (e.g flash drive, CD) 
All of the above
Verified Answer
Correct Option - d

To get all Infosys Certified Security Operation Center Associate Exam questions Join Telegram Group https://rebrand.ly/lex-telegram-236dee

Telegram