B is correct
Encryption can be challenging to security monitoring because it can be used by threat actors as a method of evasion and obfuscation, and security monitoring tools might not be able to inspect encrypted traffic
B is the correct answer
"On the other hand, those same mechanisms can be used by threat actors as a method of evasion and obfuscation. "
https://www.ciscopress.com/articles/article.asp?p=3100055&seqNum=2
upvoted 4 times
...
This section is not available anymore. Please use the main Exam Page.200-201 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
WISDOM2080
10 months, 2 weeks agoRolandoFiee
2 years, 5 months agohalamah
2 years, 8 months agoLeo_Visser
3 years ago