IS4670 CHAPTER 8 Understanding Information-Hiding Techniques Flashcards

1
Q
  1. Packet crafting and protocol bending are two ________ techniques.
A

Covert channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. ________ can be modified to embed executable malware.
A

ADS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The benefits of NTFS volumes far outweigh the potential risks of ADS, as long as system administrators are aware of streams and have the security tools to handle them.
    A. True
    B. False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A ________ is software that prevents users from seeing all items or directories on a computer.
A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Steganography is the science of extracting secret data from nonsecret data.
    A. True
    B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
6. Which of the following do attackers use to hide secret data in steganography?
A. Metadata 
B. Embedded file 
C. Carrier file 
D. Stego message
A

Carrier file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
7. Which of the following is another name for running a steganography algorithm?
A. Embedding 
B. Digital watermarking 
C. Extraction 
D. Packet crafting
A

Embedding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. With PKS, the sender and receiver share a secret key called the stego key. Only a possessor of the stego key can detect the presence of an embedded message.
    A. True
    B. False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Steganography is another name for cryptography.
    A. True
    B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which of the following is not a steganographic embedding method?
    A. Simple embedding
    B. Least significant bit embedding
    C. Frequency domain embedding
    D. Digital watermarking
    E. Preservation of the original statistical properties
A

Digital watermarking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
11. Which of the following are examples of steganography software? (Select three.)
A. StegAlyzerAS 
B. MandelSteg 
C. EzStego 
D. Stegdetect
E. Snow
F. Stegbreak
A

MandelSteg

EzStego

Snow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. The only way to defeat steganography is to use steganalysis.
    A. True
    B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which of the following is not true of steganalysis?
    A. It involves separating cover messages from stego messages.
    B. It hides secret data within non-secret data.
    C. It is the process of detecting messages hidden using steganography.
    D. It often involves the use of statistical properties to look for abnormalities in files.
A

It hides secret data within non-secret data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. ________ is the name for separating an embedded message from a stego message.
A

Extraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
15. Which of the following are examples of steganalysis software? (Select three.)
A. StegAlyzerAS 
B. MandelSteg 
C. EzStego 
D. Stegdetect
E. Snow 
F. Stegbreak"
A

StegAlyzerAS

Stegdetect

Stegbreak”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly