Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-215 Topic 9 Question 98 Discussion

Actual exam question for Cisco's 300-215 exam
Question #: 98
Topic #: 9
[All 300-215 Questions]

An investigator is analyzing an attack in which malicious files were loaded on the network and were undetected. Several of the images received during the attack include repetitive patterns. Which anti-forensic technique was used?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Lavonna
11 days ago
D, definitely D. Steganography is the way to go when you want to hide your tracks and leave no trace behind.
upvoted 0 times
...
Arlene
12 days ago
Tunneling, all the way! Sneaking those files through the network like a secret agent, that's what I call some serious hacking skills.
upvoted 0 times
...
Hortencia
14 days ago
Obfuscation, baby! Gotta love those repetitive patterns, it's like a digital maze that's tough to crack.
upvoted 0 times
...
Daniel
17 days ago
Steganography, for sure! Hiding those malicious files in plain sight, that's some sneaky stuff right there.
upvoted 0 times
...
Alayna
28 days ago
I believe it's D) steganography because it allows attackers to hide malicious files in plain sight.
upvoted 0 times
...
Sang
2 months ago
I'm not sure, but I think obfuscation could also be a possibility.
upvoted 0 times
...
Candida
2 months ago
I agree with Gerald, steganography hides data within other data.
upvoted 0 times
...
Gerald
2 months ago
I think the answer is D) steganography.
upvoted 0 times
...

Save Cancel