Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection.
Identify the behavior of the adversary in the above scenario.
A. Unspecified proxy activities
B. Use of command-line interface
C. Data staging
D. Use of DNS tunneling
Identify the behavior of the adversary in the above scenario.
A. Unspecified proxy activities
B. Use of command-line interface
C. Data staging
D. Use of DNS tunneling