CiscoCisco
200-201 · Question #562
200-201 Question #562: Real Exam Question with Answer & Explanation
The correct answer is D: Malicious data is hidden within the legitimate system processes.. Data tunneling is the technique of encapsulating or hiding malicious or unauthorized data within legitimate protocols or processes so it can pass through normal network controls while appearing
Submitted by brentm· Mar 6, 2026Security Concepts
Question
What is data tunneling?
Options
- AEncrypted information is returned to its original format.
- BData is split into packets and transported to the destination.
- CPackets are transformed into bytes and assembled by a receiver.
- DMalicious data is hidden within the legitimate system processes.
Explanation
Data tunneling is the technique of encapsulating or hiding malicious or unauthorized data within legitimate protocols or processes so it can pass through normal network controls while appearing
Topics
#data tunneling#exfiltration#evasion techniques#malware
Community Discussion
No community discussion yet for this question.