CertNexus Related Exams
CFR-410 Exam
After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?
After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?
If an organization suspects criminal activity during the response to an incident, when should they notify law enforcement authorities?