Cisco Related Exams
300-215 Exam
A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?
Refer to the exhibit.

What is occurring?
Which type of record enables forensics analysts to identify fileless malware on Windows machines?