Watch this video on YouTube
What technique can be used to exfiltrate data from a compromised system using DNS queries to evade detection by traditional security tools?