A. An email Is used to impersonate a Dank and trick users into entering their bank login information on a fake website page.
B. A hacker eavesdrops on insecure communications, such as Remote Desktop Program (RDP). and discovers login credentials.
C. A user visits a website and downloads a file that contains a worm, which sell-replicates throughout the network.
D. An attack exploits an operating system vulnerability and locks out users until they pay the ransom.