Problem: You are a member of the security team for a mining operation. Your IoT devices monitor and manage many automated processes. You are concerned about unauthorized access being used in an attempt to create availability loss. What are the two most likely vectors for an advanced persistent threat (APT) against your organization?
A. Removable Media
B. Email
C. Social media
D. Supply Chain