AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: Which of the following techniques is used by eccouncil video

Question 1
« Back   Next ethical-hacker Certification Question »

Full Certification Question

Which of the following techniques is used by an attacker to deploy a Trojan through a legal channel for securely transferring data or information in a company network?