CompTIA Exam Questions

Which of the following can take advantage of man in the middle techniques to prevent data exfiltrati

Which of the following can take advantage of man in the middle techniques to prevent data
exfiltration?

A.
DNS poisoning

B.
URL hijacking

C.
ARP spoofing

D.
HTTPS inspection