Which evasion method may be in use when TLS is observed between two endpoints?
B . 509 certificate authentication
C . encryption
D . traffic insertion
E . tunneling
Answer: D
Which evasion method may be in use when TLS is observed between two endpoints?
B . 509 certificate authentication
C . encryption
D . traffic insertion
E . tunneling
Answer: D