200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
A security incident occurred with the potential of impacting business services.
A security incident occurred with the potential of impacting business services.
Who performs the attack?
- A . malware author
- B . threat actor
- C . bug bounty hunter
- D . direct competitor