Question 11:
A penetration tester who is doing a company-requested assessment would like to send traffic to another system using double tagging. Which of the following techniques would BEST accomplish this goal?
Answer options:
A. RFID cloning B. RFID tagging C. Meta tagging D. Tag nesting