This is a dedicated watch page for a single video.
A hacker created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection. Which of the following describes the behavior of the adversary in the above scenario?