Question

In the TJX breach, attackers first got into the network through ________.
A) spear phishing
B) an inside conspirator
C) the use of weak wireless encryption
D) all of the above

Answer

This answer is hidden. It contains 1 characters.