Which threat can be traced back to the application abuse pain point?
A.
Day Zero worms and viruses
B.
DoS attacks
C.
unauthorized user access
D.
operational complexities
E.
protocol manipulation
Explanation:
Not E: Protocol Manipulation would be a better answer for Theft of Information