CompTIA Security+ SY0-601 – Question203

An attacker has determined the best way to impact operations is to infiltrate third-party software vendors. Which
of the following vectors is being exploited?


A.
Social media
B. Cloud
C. Supply chain
D. Social Engineering

Correct Answer: C