Fill in the blank: To avoid detection during eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for fill in the blank: To avoid detection during data exfiltration, attackers may use the technique known as _____, where they fragment

Full Certification Question

Fill in the blank: To avoid detection during data exfiltration, attackers may use the technique known as _____, where they fragment data into small packets and transmit it over different protocols.