List of questions
Related questions
Question 99 - 200-201 discussion
An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.
Which obfuscation technique is the attacker using?
A.
Base64 encoding
B.
TLS encryption
C.
SHA-256 hashing
D.
ROT13 encryption
Your answer:
0 comments
Sorted by
Leave a comment first