✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
A penetration tester is transferring a payload file from their attacking machine to a compromised target using Netcat. On the target machine, the tester has already set up a Netcat listener to receive the file. From the attacker's system, they execute a command to send the file over the open connection.Which Netcat file transfer mode is being used in this scenario?