300-215 · Question #8
300-215 Question #8: Real Exam Question with Answer & Explanation
The correct answer is C: obfuscation. This scenario describes a substitution cipher, where data is made unreadable or less recognizable without altering its functionality. According to the Cisco CyberOps Associate guide, obfuscation includes techniques such as shifting, encoding, and symbol manipulation to mask the t
Question
A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?
Options
- Aencryption
- Btunneling
- Cobfuscation
- Dpoisoning
Explanation
This scenario describes a substitution cipher, where data is made unreadable or less recognizable without altering its functionality. According to the Cisco CyberOps Associate guide, obfuscation includes techniques such as shifting, encoding, and symbol manipulation to mask the true nature of data or code: "A very well-known cipher, the Caesar cipher... shifts the letter of the alphabet by a fixed number... This technique is a form of data obfuscation used to bypass detection mechanisms.".
Topics
Community Discussion
No community discussion yet for this question.