IS4670 CHAPTER 8 Understanding Information-Hiding Techniques Flashcards
1
Q
- Packet crafting and protocol bending are two ________ techniques.
A
Covert channel
2
Q
- ________ can be modified to embed executable malware.
A
ADS
3
Q
- The benefits of NTFS volumes far outweigh the potential risks of ADS, as long as system administrators are aware of streams and have the security tools to handle them.
A. True
B. False
A
True
4
Q
- A ________ is software that prevents users from seeing all items or directories on a computer.
A
Rootkit
5
Q
- Steganography is the science of extracting secret data from nonsecret data.
A. True
B. False
A
False
6
Q
6. Which of the following do attackers use to hide secret data in steganography? A. Metadata B. Embedded file C. Carrier file D. Stego message
A
Carrier file
7
Q
7. Which of the following is another name for running a steganography algorithm? A. Embedding B. Digital watermarking C. Extraction D. Packet crafting
A
Embedding
8
Q
- With PKS, the sender and receiver share a secret key called the stego key. Only a possessor of the stego key can detect the presence of an embedded message.
A. True
B. False
A
True
9
Q
- Steganography is another name for cryptography.
A. True
B. False
A
False
10
Q
- Which of the following is not a steganographic embedding method?
A. Simple embedding
B. Least significant bit embedding
C. Frequency domain embedding
D. Digital watermarking
E. Preservation of the original statistical properties
A
Digital watermarking
11
Q
11. Which of the following are examples of steganography software? (Select three.) A. StegAlyzerAS B. MandelSteg C. EzStego D. Stegdetect E. Snow F. Stegbreak
A
MandelSteg
EzStego
Snow
12
Q
- The only way to defeat steganography is to use steganalysis.
A. True
B. False
A
False
13
Q
- Which of the following is not true of steganalysis?
A. It involves separating cover messages from stego messages.
B. It hides secret data within non-secret data.
C. It is the process of detecting messages hidden using steganography.
D. It often involves the use of statistical properties to look for abnormalities in files.
A
It hides secret data within non-secret data.
14
Q
- ________ is the name for separating an embedded message from a stego message.
A
Extraction
15
Q
15. Which of the following are examples of steganalysis software? (Select three.) A. StegAlyzerAS B. MandelSteg C. EzStego D. Stegdetect E. Snow F. Stegbreak"
A
StegAlyzerAS
Stegdetect
Stegbreak”