A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an attack vector?
- the potential of causing great damage because of direct access to the building and its infrastructure devices
- the unauthorized transfer of data containing valuable corporate information to a USB drive
- the path by which a threat actor can gain access to a server, host, or network
- the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software