nerdexam
CiscoCisco

300-215 · Question #8

300-215 Question #8: Real Exam Question with Answer & Explanation

The correct answer is C: obfuscation. This scenario describes a substitution cipher, where data is made unreadable or less recognizable without altering its functionality. According to the Cisco CyberOps Associate guide, obfuscation includes techniques such as shifting, encoding, and symbol manipulation to mask the t

Submitted by kev92· Mar 6, 2026Cloud Security Risks & Threat Mitigation

Question

A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?

Options

  • Aencryption
  • Btunneling
  • Cobfuscation
  • Dpoisoning

Explanation

This scenario describes a substitution cipher, where data is made unreadable or less recognizable without altering its functionality. According to the Cisco CyberOps Associate guide, obfuscation includes techniques such as shifting, encoding, and symbol manipulation to mask the true nature of data or code: "A very well-known cipher, the Caesar cipher... shifts the letter of the alphabet by a fixed number... This technique is a form of data obfuscation used to bypass detection mechanisms.".

Topics

#Anti-forensics#Obfuscation#Evasion techniques#Threat actor tactics

Community Discussion

No community discussion yet for this question.

Full 300-215 PracticeBrowse All 300-215 Questions