CertNexus Related Exams
CFR-410 Exam
Which of the following is BEST suited to prevent piggybacking into a sensitive or otherwise restricted area of a facility?
After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?