Which of the following can take advantage of man-in-the-middle techniques to prevent data exfiltration?
A.
DNS poisoning
B.
URL hijacking
C.
ARP spoofing
D.
HTTPS inspection
Which of the following can take advantage of man-in-the-middle techniques to prevent data exfiltration?
Which of the following can take advantage of man-in-the-middle techniques to prevent data exfiltration?
A.
DNS poisoning
B.
URL hijacking
C.
ARP spoofing
D.
HTTPS inspection
can someone please explain?