List of questions
Related questions
Question 146 - PT0-002 discussion
A penetration tester wants to validate the effectiveness of a DLP product by attempting exfiltration of data using email attachments. Which of the following techniques should the tester select to accomplish this task?
A.
Steganography
B.
Metadata removal
C.
Encryption
D.
Encode64
Your answer:
0 comments
Sorted by
Leave a comment first