During an investigation of a data breach, forensic experts found evidence of data exfiltration through an encrypted channel. This scenario primarily involves the technique of ____________.

  • Covert Channel
  • Encryption Tunnel
  • SQL Injection
  • Steganography
The scenario describes the use of an encrypted channel for data exfiltration, commonly achieved through techniques like encryption tunnels. Attackers use covert communication channels to hide their activities. Recognizing the role of encryption in data exfiltration is crucial for digital forensics professionals to identify and mitigate such threats.__________________________________________________
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *