exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 33 discussion

Actual exam question from Cisco's 200-201
Question #: 33
Topic #: 1
[All 200-201 Questions]

When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?

  • A. fragmentation
  • B. pivoting
  • C. encryption
  • D. stenography
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
evra
Highly Voted 3 years, 9 months ago
It is A https://en.wikipedia.org/wiki/Intrusion_detection_system_evasion_techniques
upvoted 22 times
Leo_Visser
3 years, 6 months ago
I would agree C and D both need keys to work and B is only used to go to another network but wont evade the IDS perse. more info: https://www.ciscopress.com/articles/article.asp?p=3100055&seqNum=3
upvoted 3 times
fyticez
2 years, 3 months ago
Even if ste(ga)nography needs a key to decode the embedded secret, it still relates to discernible (vs. incomprehensible) output.
upvoted 1 times
...
...
...
anonymous1966
Highly Voted 3 years, 4 months ago
By the Book, I believe Fragmentation would be correct. Traditional IDS and IPS devices also suffer from many evasion attacks. The following are some of the most common evasion techniques against traditional IDS and IPS devices: Fragmentation: Attackers can evade the IPS box by sending fragmented packets. Using low-bandwidth attacks: Attackers can use techniques that use low-bandwidth or a very small number of packets to evade the system. Address spoofing/proxying: Attackers can use spoofed IP addresses or sources, as well as intermediary systems such as proxies to evade inspection. Pattern change evasion: Attackers may use polymorphic techniques to create unique attack patterns. Encryption: Attackers can use encryption to hide their communication and information.
upvoted 11 times
anonymous1966
3 years, 4 months ago
Steganography is used for hiding text. I believe that it is not the question. Steganography is the practice of hiding a secret message inside of (or even on top of) something that is not secret. That something can be just about anything you want. These days, many examples of steganography involve embedding a secret piece of text inside of a picture. Or hiding a secret message or script inside of a Word or Excel document. https://www.comptia.org/blog/what-is-steganography
upvoted 4 times
...
...
abbeyade
Most Recent 2 days, 17 hours ago
Selected Answer: A
C and D required key
upvoted 1 times
...
3000bd6
1 month, 3 weeks ago
Selected Answer: D
I believe it's D
upvoted 1 times
...
d503c75
4 months ago
Answer is the option D. Incomprehensible = hiden Steganography can be used to "hide" virtually any type of digital content, including text, image, video, or audio content. And to do this, you don't need a specific key, certificate or password.
upvoted 2 times
...
WISDOM2080
1 year, 4 months ago
C. encryption
upvoted 1 times
...
Faio
1 year, 5 months ago
The answer is C. encryption. Encryption is the process of converting data into a form that is unreadable without a specific key. This can be used to evade IDS/IPS devices by making the data incomprehensible to them.
upvoted 3 times
...
drdecker100
1 year, 11 months ago
Selected Answer: C
When an attacker is trying to evade detection by IDS/IPS devices, they may use encryption to make their communication unreadable to the security tools that are monitoring the network. By encrypting their data, the attacker can make it more difficult for the IDS/IPS devices to detect and analyze the content of their communication. Fragmentation involves splitting up data into smaller packets, which can also be used to evade IDS/IPS devices, but it doesn't make the data incomprehensible.
upvoted 2 times
...
SecurityGuy
1 year, 11 months ago
Selected Answer: C
After months of studying, I realized that C - Encryption is the correct answer. - The question is "Evading IDS/IPS" and there is no way to use Stenography to evade IDS/IPS. Intrusion Detection Evasive Techniques: Most attackers are aware of IDSs and use evasive techniques to dodge them. These evasive techniques include flooding, fragmentation, encryption, and obfuscation. https://www.pearsonitcertification.com/articles/article.aspx?p=174342&seqNum=3#:~:text=Most%20attackers%20are%20aware%20of,fragmentation%2C%20encryption%2C%20and%20obfuscation.
upvoted 3 times
...
youssssef
1 year, 11 months ago
Selected Answer: C
encryption
upvoted 1 times
...
aaawnd
2 years, 1 month ago
Selected Answer: C
just encryption need a key, certificate or password to see this info and is an evasion technique
upvoted 2 times
Chris1971
2 years ago
but the question is "data incomprehensible without a specific key," so "C" is wrong
upvoted 2 times
...
...
SecurityGuy
2 years, 3 months ago
Selected Answer: D
I believe the correct answer is "D" Stenography is writing on a different way, which can be used to hide the true meaning of the subject. The purpose of steganography is to conceal and deceive. It is a form of covert communication and can involve the use of any medium to hide messages. It's not a form of cryptography, because it doesn't involve scrambling data or using a key. Instead, it is a form of data hiding and can be executed in clever ways. https://www.comptia.org/blog/what-is-steganography#:~:text=The%20purpose%20of%20steganography%20is,be%20executed%20in%20clever%20ways.
upvoted 3 times
...
Giacomius
2 years, 4 months ago
I would agree on A --> "Traditional IDS and IPS devices also suffer from many evasion attacks. The following are some of the most common evasion techniques against traditional IDS and IPS devices: • Fragmentation: Attackers can evade the IPS box by sending fragmented packets. • Using low-bandwidth attacks: Attackers can use techniques that use low-bandwidth or a very small number of packets to evade the system. • Address spoofing/proxying: Attackers can use spoofed IP addresses or sources, as well as intermediary systems such as proxies to evade inspection. • Pattern change evasion: Attackers may use polymorphic techniques to create unique attack patterns. • Encryption: Attackers can use encryption to hide their communication and information." Ref: Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide Omar Santos
upvoted 1 times
...
[Removed]
2 years, 5 months ago
I might be wrong but encryption is used by threat actors as a method of evasion and obfuscation https://www.ciscopress.com/articles/article.asp?p=3100055&seqNum=2 From here I egree with answer C.
upvoted 1 times
...
Nhendy
2 years, 6 months ago
Selected Answer: C
Incomprehensible without decryption, then answer is encryption
upvoted 1 times
...
Kane4555
2 years, 6 months ago
Selected Answer: C
Both C and D are correct, as both fulfill the requirements, but C is on the exam objectives and D is not, so C. These questions are fairly terrible. People saying A need reading comprehension.
upvoted 2 times
...
bodybod
2 years, 8 months ago
Selected Answer: A
it says WITHOUT A KEY which is A Fragmentation no doubt
upvoted 2 times
msingh20
2 years, 6 months ago
It says leads the data incomprehensible WITHOUT a key. Hence a key is required to decrypt it. I think you have misinterpreted it as it does not use a key.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago