Which of the following are reasons why an attacker might use VPN technology?
A. Attackers cannot use VPN technologies without being detected.
B. To exfiltrate data.
C. To encrypt traffic between a compromised host and a command and control system.
D. To evade detection.