Exhibit:
In order to obtain attack information so that you can create a new attack object definition, you must
follow certain steps. Given the steps in the exhibit, assume you have acquired the attack source
code. What is the correct order for these steps?
A.
c, e, b, d, a
B.
c, d, a, e, b
C.
c, d, e, a, b
D.
e, c, d, b, a
Explanation: