New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 3 Question 2 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 2
Topic #: 3
[All CPEH-001 Questions]

Lori is a Certified Ethical Hacker as well as a Certified Hacking Forensics Investigator working as an IT security consultant. Lori has been hired on by Kiley Innovators, a large marketing firm that recently underwent a string of thefts and corporate espionage incidents. Lori is told that a rival marketing company came out with an exact duplicate product right before Kiley Innovators was about to release it. The executive team believes that an employee is leaking information to the rival company. Lori questions all employees, reviews server logs, and firewall logs; after which she finds nothing. Lori is then given permission to search through the corporate email system. She searches by email being sent to and sent from the rival marketing company. She finds one employee that appears to be sending very large email to this other marketing company, even though they should have no reason to be communicating with them. Lori tracks down the actual emails sent and upon opening them, only finds picture files attached to them. These files seem perfectly harmless, usually containing some kind of joke. Lori decides to use some special software to further examine the pictures and finds that each one had hidden text that was stored in each picture. What technique was used by the Kiley Innovators employee to send information to the rival marketing company?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Reyes
4 months ago
Logical watermarking? That doesn’t even fit the scenario!
upvoted 0 times
...
Lon
4 months ago
Definitely steganography, no doubt about it.
upvoted 0 times
...
Giuseppe
4 months ago
Wow, hidden text in pictures? That's sneaky!
upvoted 0 times
...
Amber
4 months ago
I thought cryptography was the way to go here.
upvoted 0 times
...
Sylvia
5 months ago
Sounds like classic steganography to me!
upvoted 0 times
...
Carylon
5 months ago
I feel like picture fuzzing was mentioned in one of our lectures, but it doesn't sound right for this scenario. Steganography seems more fitting.
upvoted 0 times
...
Mickie
5 months ago
This question reminds me of a practice exam where we discussed watermarking. But I don't think that's what happened here.
upvoted 0 times
...
Nada
5 months ago
I'm not entirely sure, but I think cryptography is more about encrypting text rather than hiding it in images.
upvoted 0 times
...
Lizbeth
5 months ago
I remember studying steganography in class, and it seems like the employee used that technique to hide information in the pictures.
upvoted 0 times
...
Tyisha
5 months ago
Hmm, I'm a bit unsure about this one. I'll have to think it through carefully before selecting an answer.
upvoted 0 times
...
Martha
5 months ago
I got this! The answer is C, zero. After call work is the time spent on post-call activities, and that's always zero.
upvoted 0 times
...

Save Cancel