200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Why is encryption challenging to security monitoring?

  • A . Encryption analysis is used by attackers to monitor VPN tunnels.
  • B . Encryption is used by threat actors as a method of evasion and obfuscation.
  • C . Encryption introduces additional processing requirements by the CP
  • E . Encryption introduces larger packet sizes to analyze and store.
Answer: Option B.
Explanation: 

No answer description available for this question.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
error: Alert: Content is protected !!

Adblock Detected

Please consider supporting us by disabling your ad blocker