AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: Which of the following techniques is used by eccouncil video

Question 1 Be Honest
« Back   Next ethical-hacker Certification Question »
Answer

Full Certification Question

Which of the following techniques is used by an attacker to deploy a Trojan through a legal channel for securely transferring data or information in a company network?