Answer:
Automated post-exploitation tools may include functionalities for extracting and transferring sensitive data to external servers during exfiltration.
Automated post-exploitation tools may include functionalities for extracting and transferring sensitive data to external servers during exfiltration.
You may be interested in:
Web Security MCQs