Logical Operations CFR-210 Question Answer
Which of the following describes pivoting?
Copying captured data to a hacker’s system
Performing IP packet inspection
Generating excessive network traffic
Accessing another system from a compromised system
TESTED 24 Feb 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved