An organization is concerned about potential attacks using steganography to hide malicious data within image files. After a recent breach, the incident response team found that an attacker had managed to sneak past their defenses by hiding a keylogger inside a legitimate image. Given that the attacker has knowledge of the organization’s steganography detection techniques, which method of steganalysis would likely be the most effective in detecting such a steganographic attack in the future? A. Chi-square attack, where the analyst performs probability analysis to test whether the stego object and original data are identical B. Known-message attack, where the analyst has a known hidden message in the corresponding stego-image and looks for patterns that arise from hiding the message C. Known-stego attack, where the analyst knows both the steganography algorithm and original and stego-object D. Chosen-message attack, where the analyst uses a known message to generate a stego-object in order to find the steganography algorithm used Suggested Answer: D Community Answer: A This question is in 312-49V10 EC-Council Computer Hacking Forensic Investigator (CHFI) v10 Exam For getting EC-Council Computer Hacking Forensic Investigator (CHFI) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by EC-Council. Trademarks, certification & product names are used for reference only and belong to EC-Council. The website does not contain actual questions and answers from EC-Council's Certification Exams.
Please login or Register to submit your answer