A must be right
"ALTERING" you alter the files data is such way the NEW HASH is different from original file OLD HASH. therefore this technique describes altering the data content and by that avoiding detection
On the other hand tunneling only sends the data. in no such way does it alter it...
Nvm I was wrong:
Tunneling
Tunneling is a form of obfuscation where data is encapsulated inside other protocols.
Example: Sending malicious commands hidden inside DNS traffic (DNS tunneling) or HTTP packets.
The goal is to hide the true nature or purpose of the communication.
I want to say A, why ? because
A. data modification, such as hashing
Explanation:
Altering the data content to avoid identification involves transforming the data in such a way that the original content cannot be easily recognized or traced back to its source. Hashing is a common technique for this purpose, as it converts data into a fixed-length string of characters, typically a hash value, which cannot be reversed to reveal the original data. This ensures privacy and prevents unauthorized identification.
Tunneling is the process by which VPN packets reach their intended destination, which is typically a private network.
Many VPNs use the IPsec protocol suite. IPsec is a group of protocols that run directly on top of IP at the network layer.
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.200-201 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Frontal
3 weeks agoFrontal
3 weeks agomgo28404
3 months, 2 weeks agosheyshey
4 months, 3 weeks agoSecurityGuy
8 months, 2 weeks ago