200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Why is encryption challenging to security monitoring?
- A . Encryption analysis is used by attackers to monitor VPN tunnels.
- B . Encryption is used by threat actors as a method of evasion and obfuscation.
- C . Encryption introduces additional processing requirements by the CP
- E . Encryption introduces larger packet sizes to analyze and store.