What are source methods involved in creating the security incidents?

Email (example: phishing) & Loss or Theft of Equipment
Web (e.g. drive-by download) & Malware (e.g. virus,trojan,etc.)
By External/Removable Media (e.g flash drive, CD) 
All of the above
Correct Option - d

To get all Infosys Certified Security Operation Center Associate Exam questions Join Group https://bit.ly/infy_premium_group

We're passionate about offering best placement materials and courses!! A one stop place for Placement Materials. We daily post Offcampus updates and Placement Materials.

Qtr No. 213, New Town Yehlanka Indore 454775

admin@prepflix.in