Question 6: Which exfiltration technique do you find most concerning due to its potential to go undetected? Poll: (choose answer - no wrong answer): () DNS Tunneling () HTTP Protocol () File Transfers () ICMP Protocol Answer: DNS Tunneling