CompTIA Exam Questions

Which of the following can take advantage of man-in-the…

Which of the following can take advantage of man-in-the-middle techniques to prevent data exfiltration?

A.
DNS poisoning

B.
URL hijacking

C.
ARP spoofing

D.
HTTPS inspection