Final answer:
The threat vector used by a threat actor with physical access to an organization's wired network is likely B. Direct Access. It allows the attacker to directly connect to network devices and potentially introduce malware, exploit vulnerabilities, or steal information.
Step-by-step explanation:
If a threat actor gains physical access to an organization's premises and attempts to perpetrate an attack on the wired network, the specific threat vectors associated with unsecured networks that are likely used by the threat actor in this scenario would be B. Direct access. This type of access allows the attacker to bypass many network security measures because they are physically present and can connect directly to network devices or systems. Once the threat actor has direct access to the network, they may attempt various attacks such as introducing malware, exploiting vulnerabilities, or stealing sensitive information.
Some common methods used by threat actors with direct access include:
- Installing hardware keystroke loggers to capture passwords.
- Plugging in a USB device with malicious software.
- Connecting a laptop to an unsecured network port within the facility.
- Manipulating network devices through console ports.
Direct access allows for a broad range of potential exploits and is a significant security threat when physical security measures are not adequately enforced.