nerdexam
CiscoCisco

200-201 · Question #562

200-201 Question #562: Real Exam Question with Answer & Explanation

The correct answer is D: Malicious data is hidden within the legitimate system processes.. Data tunneling is the technique of encapsulating or hiding malicious or unauthorized data within legitimate protocols or processes so it can pass through normal network controls while appearing

Submitted by brentm· Mar 6, 2026Security Concepts

Question

What is data tunneling?

Options

  • AEncrypted information is returned to its original format.
  • BData is split into packets and transported to the destination.
  • CPackets are transformed into bytes and assembled by a receiver.
  • DMalicious data is hidden within the legitimate system processes.

Explanation

Data tunneling is the technique of encapsulating or hiding malicious or unauthorized data within legitimate protocols or processes so it can pass through normal network controls while appearing

Topics

#data tunneling#exfiltration#evasion techniques#malware

Community Discussion

No community discussion yet for this question.

Full 200-201 PracticeBrowse All 200-201 Questions