Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIH Topic 5 Question 10 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 10
Topic #: 5
[All GCIH Questions]

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant

color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Dominga
1 months ago
I'm going to go with 'Chosen-Stego Attack' for this one. Victor seems to be purposefully trying to extract the hidden information, rather than just passively detecting it.
upvoted 0 times
...
Mona
1 months ago
Haha, Victor's like a secret agent, trying to uncover that hidden message! I bet he's having fun with all those image manipulation techniques. Just don't get too carried away, dude!
upvoted 0 times
German
15 days ago
C) Steg-Only Attack
upvoted 0 times
...
Leonida
16 days ago
B) Chosen-Stego Attack
upvoted 0 times
...
Una
19 days ago
A) Stegdetect Attack
upvoted 0 times
...
...
Sanjuana
2 months ago
Reducing noise, sharpening, and softening the image? Sounds like Victor is really trying to enhance the image to get a better look at that hidden data. I'll guess 'Steg-Only Attack' for this one.
upvoted 0 times
Lenny
11 days ago
Yes, reducing noise and sharpening the image can help reveal hidden data.
upvoted 0 times
...
Elizabeth
15 days ago
I agree, he seems to be focusing on enhancing the image.
upvoted 0 times
...
Jamey
1 months ago
I think Victor is using the Steg-Only Attack.
upvoted 0 times
...
...
Maryann
2 months ago
Hmm, I'm not sure which attack this is. The options sound a bit like multiple choice exam questions. Time to brush up on my Steganography knowledge!
upvoted 0 times
Natalya
5 days ago
D) Active Attacks
upvoted 0 times
...
Lura
6 days ago
C) Steg-Only Attack
upvoted 0 times
...
Toshia
7 days ago
B) Chosen-Stego Attack
upvoted 0 times
...
Veronika
1 months ago
A) Stegdetect Attack
upvoted 0 times
...
...
Sherita
2 months ago
Wow, Victor seems to be doing a thorough job with those Steganography techniques. I bet he's going to find that hidden information in no time!
upvoted 0 times
...
Kris
2 months ago
I'm not sure, but I think it could also be the Steg-Only Attack based on the methods Victor mentioned.
upvoted 0 times
...
Catalina
2 months ago
I agree with Silva, the techniques Victor used align with the Chosen-Stego Attack.
upvoted 0 times
...
Silva
2 months ago
I think Victor is using the Chosen-Stego Attack.
upvoted 0 times
...
Carmen
2 months ago
I agree with Keith, Victor's techniques seem more aligned with Chosen-Stego Attack.
upvoted 0 times
...
Keith
2 months ago
I believe Victor is actually using Chosen-Stego Attack.
upvoted 0 times
...
Isidra
3 months ago
I think Victor is using Steg-Only Attack.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77