List of questions
Related questions
Question 28 - PT0-002 discussion
A penetration tester who is doing a company-requested assessment would like to send traffic to another system using double tagging. Which of the following techniques would BEST accomplish this goal?
A.
RFID cloning
B.
RFID tagging
C.
Meta tagging
D.
Tag nesting
Your answer:
0 comments
Sorted by
Leave a comment first