Summary
This chapter covered common threat vectors and attack surfaces, ranging from message-based vectors to voice calls. We then reviewed several types of unsecure networks and considered the threat posed by supply chain attacks, including social engineering attacks such as phishing and brand impersonation.
The knowledge gained in this chapter will prepare you to answer any questions relating to Exam Objective 2.2 in your CompTIA Security+ certification exam.
The next chapter of this book is Chapter 7, Explain various types of vulnerabilities.