This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc. You are auditing the security of the organization's Internet firewall. Out of the following attack techniques, which one has a higher chance of success due to an inherent security weakness in the firewall?