✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
As attackers adapt new C2 and exfil techniques, traditional IDS becomes less effective at identifying threats. Which of the following techniques can be used to detect C2 that is commonly missed by traditional IDS techniques?