200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?

  • A . fragmentation
  • B . pivoting
  • C . encryption
  • D . stenography
Answer: Option C.
Explanation: 

https://techdifferences.com/difference-between-steganography-and-cryptography.html#:~:text=The%20steganography%20and%20cryptography%20are,the%2 0structure%20of%20the%20message.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
error: Alert: Content is protected !!

Adblock Detected

Please consider supporting us by disabling your ad blocker