Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 13 Topic 2 Discussion

Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 13 Topic 2 Discussion

300-215 Exam Topic 2 Question 13 Discussion:
Question #: 13
Topic #: 2

A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?


A.

encryption


B.

tunneling


C.

obfuscation


D.

poisoning


Get Premium 300-215 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.