CertNexus CFR-410 Question Answer
After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?
CertNexus CFR-410 Summary
- Vendor: CertNexus
- Product: CFR-410
- Update on: Oct 18, 2025
- Questions: 180