What technique can an attacker use to obfuscate a malware application payload,
allowing it to bypass standard security mechanisms?
A.
BASE64
B.
steganography
C.
a PE32 header
D.
decryption
E.
Teredo tunneling
Explanation:
Base64 is a group of similar binary-to-text encoding schemes that represent binary data
in an ASCII string format by translating it into a radix-64 representation. The term
Base64 originates from a specific MIME content transfer encoding.
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek
words steganos (στεγανός), meaning “covered, concealed, or protected”, and graphein
(γράφειν) meaning “writing”.
In computer networking, Teredo is a transition technology that gives full IPv6 connectivity for IPv6-capable hosts that are on the IPv4 Internet but have no native connection to
an IPv6 network. Unlike similar protocols, it can perform its function even from behind
network address translation (NAT) devices such as home routers.