Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 13 Topic 2 Discussion
300-215 Exam Topic 2 Question 13 Discussion:
Question #: 13
Topic #: 2
A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?
This scenario describes asubstitution cipher, where data is made unreadable or less recognizable without altering its functionality. According to the Cisco CyberOps Associate guide, obfuscation includes techniques such as shifting, encoding, and symbol manipulation to mask the true nature of data or code:
"A very well-known cipher, the Caesar cipher... shifts the letter of the alphabet by a fixed number... This technique is a form of data obfuscation used to bypass detection mechanisms.".
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit