exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 260 discussion

Actual exam question from Cisco's 200-201
Question #: 260
Topic #: 1
[All 200-201 Questions]

Which technique describes altering the data content and avoiding identification?

  • A. data modification, such as hashing
  • B. catching clear text data transfer
  • C. data in transit hijacking
  • D. obfuscation, such as tunneling
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
sheyshey
3 days, 13 hours ago
Selected Answer: D
Ma boi secguy is correct.. D
upvoted 1 times
...
SecurityGuy
3 months, 3 weeks ago
Selected Answer: D
Tunneling is the process by which VPN packets reach their intended destination, which is typically a private network. Many VPNs use the IPsec protocol suite. IPsec is a group of protocols that run directly on top of IP at the network layer.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago