Logical Operations CFR-210 Question Answer
Which of the following describes pivoting?
Copying captured data to a hacker’s system
Performing IP packet inspection
Generating excessive network traffic
Accessing another system from a compromised system
TESTED 22 Dec 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved