Which two network protocols can be used by a threat actor to exfiltrate data in traffic that is disguised as normal network traffic? (Choose two.)
- NTP
- DNS
- HTTP
- syslog
- SMTP
Exam with this question: CyberOps Associate Final Exam Answers
Please login or Register to submit your answer