200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?
- A . fragmentation
- B . pivoting
- C . encryption
- D . stenography