ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 146 - PT0-002 discussion

Report
Export

A penetration tester wants to validate the effectiveness of a DLP product by attempting exfiltration of data using email attachments. Which of the following techniques should the tester select to accomplish this task?

A.
Steganography
Answers
A.
Steganography
B.
Metadata removal
Answers
B.
Metadata removal
C.
Encryption
Answers
C.
Encryption
D.
Encode64
Answers
D.
Encode64
Suggested answer: B

Explanation:

All other answers are a form of encryption or randomizing the data.

asked 02/10/2024
Claudia Arrais
49 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first