| ________ is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.
Choose the correct option from below list
(1)Attack Strategy
(2)Chain of attack
(3)Attack Trajectory
(4)Line of attack
Answer:-(2)Chain of attack | | |