Which of the following types of threats did the Stuxnet attack rely on to cross an airgap between a business and an industrial control system network?
a) Phishing
b) Malware
c) Zero-day exploit
d) Social engineering