Quiz Found
CISCO
What type of trust exploitation attack uses a compromised host to pass traffic through a firewall that would otherwise be blocked.
What type of trust exploitation attack uses a compromised host to pass traffic through a firewall that would otherwise be blocked.
What type of trust exploitation attack uses a compromised host to pass traffic through a firewall that would otherwise be blocked.
Answer: Port Redirection
Learn More :
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.