What does cyber attribution identity in an investigation?
A . cause of an attack
B . exploit of an attack
C . vulnerabilities exploited
D . threat actors of an attack
Answer: D
What does cyber attribution identity in an investigation?
A . cause of an attack
B . exploit of an attack
C . vulnerabilities exploited
D . threat actors of an attack
Answer: D