ethical-hacker video for fill in the blank: To avoid detection during data exfiltration, attackers may use the technique known as _____, where they fragment
Fill in the blank: To avoid detection during data exfiltration, attackers may use the technique known as _____, where they fragment data into small packets and transmit it over different protocols.