Which of the following techniques should the tester select to accomplish this task?

A penetration tester wants to validate the effectiveness of a DLP product by attempting exfiltration of data using email attachments.

Which of the following techniques should the tester select to accomplish this task?
A . Steganography
B . Metadata removal
C . Encryption
D . Encode64

Answer: B

Explanation:

All other answers are a form of encryption or randomizing the data.

Latest PT0-002 Dumps Valid Version with 110 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments