When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?
A. fragmentation
B. pivoting
C. encryption
D. stenography
When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?
A. fragmentation
B. pivoting
C. encryption
D. stenography
specific key, certificate and password would indicate Encryption. Nowhere in the study material is stenography even mentioned. Never head of a certificate for stenography.. Fragmentation does not require any of the three lock openers.
Am I tripping or the data still “comprehensible” with stenography? It’s just hidden?
I think the answer is fragmentation.