The attack vector that was used by the threat actor is D. Removeable media.
The type of vulnerability scan mimics the work of a threat actor is called B. Credential Scan.
The technique that the threat actor using to move through the network is B. Lateral movement.
In a device driver manipulation attack, the changes a device driver's existing code design is B. Refactoring
A scan known as a "credential vulnerability scan" involves a successful authentication of credentials. Examples include providing usernames, passwords, and other information to the vulnerability scanner in order to act like a threat actor who has access to those credentials.
They are notorious for being extremely slow, but they can provide a thorough understanding of the system by accessing a variety of the installed software.
In order to find the important data and assets that will ultimately be the target of their attack campaigns, cyberattackers, also known as threat actors, employ techniques known as network lateral movement, or simply lateral movement.
Learn more about scan on:
https://brainly.com/question/25804291
#SPJ1