exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 260 discussion

Actual exam question from Cisco's 200-201
Question #: 260
Topic #: 1
[All 200-201 Questions]

Which technique describes altering the data content and avoiding identification?

  • A. data modification, such as hashing
  • B. catching clear text data transfer
  • C. data in transit hijacking
  • D. obfuscation, such as tunneling
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Frontal
3 weeks ago
Selected Answer: A
A must be right "ALTERING" you alter the files data is such way the NEW HASH is different from original file OLD HASH. therefore this technique describes altering the data content and by that avoiding detection On the other hand tunneling only sends the data. in no such way does it alter it...
upvoted 1 times
Frontal
3 weeks ago
Nvm I was wrong: Tunneling Tunneling is a form of obfuscation where data is encapsulated inside other protocols. Example: Sending malicious commands hidden inside DNS traffic (DNS tunneling) or HTTP packets. The goal is to hide the true nature or purpose of the communication.
upvoted 1 times
...
...
mgo28404
3 months, 2 weeks ago
Selected Answer: A
I want to say A, why ? because A. data modification, such as hashing Explanation: Altering the data content to avoid identification involves transforming the data in such a way that the original content cannot be easily recognized or traced back to its source. Hashing is a common technique for this purpose, as it converts data into a fixed-length string of characters, typically a hash value, which cannot be reversed to reveal the original data. This ensures privacy and prevents unauthorized identification.
upvoted 1 times
...
sheyshey
4 months, 3 weeks ago
Selected Answer: D
Ma boi secguy is correct.. D
upvoted 1 times
...
SecurityGuy
8 months, 2 weeks ago
Selected Answer: D
Tunneling is the process by which VPN packets reach their intended destination, which is typically a private network. Many VPNs use the IPsec protocol suite. IPsec is a group of protocols that run directly on top of IP at the network layer.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago