AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: Scenario: A cybersecurity professional eccouncil video

Question 1
« Back   Next ethical-hacker Certification Question »

Full Certification Question

Scenario: A cybersecurity professional discovers that sensitive data from a compromised system was exfiltrated through an encrypted channel that mimicked regular HTTPS traffic. What technique was likely employed?