Watch this video on YouTube
Which of the following strategies do data loss prevention (DLP) solutions use to detect poorly obfuscated attempts at data exfiltration?