Problem
When it comes to detecting indicators with the Pyramid of Pain, what is trivial for an attacker to change to bypass their tool or technique from being detected? Group of answer choices Tools Hashes Domain Name IP Address Network / Host Artifacts.