Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam GCIH All Questions
Exam GCIH All Questions

View all questions & answers for the GCIH exam

GIAC Security Administration GCIH Question # 83 Topic 9 Discussion

GCIH Exam Topic 9 Question 83 Discussion:
Question #: 83
Topic #: 9

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?


A.

Stegdetect Attack


B.

Chosen-Stego Attack


C.

Steg-Only Attack


D.

Active Attacks


Get Premium GCIH Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.