New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 5 Question 10 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 10
Topic #: 5
[All GCIH Questions]

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant

color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Dottie
3 months ago
I agree, Active Attacks seems to fit best here.
upvoted 0 times
...
Chauncey
3 months ago
Definitely not Stegdetect, that's for sure.
upvoted 0 times
...
Yolande
3 months ago
Wait, is he really doing all that just for Steganography?
upvoted 0 times
...
Serina
4 months ago
I think it's more like a Chosen-Stego Attack.
upvoted 0 times
...
Leila
4 months ago
Sounds like he's using Active Attacks.
upvoted 0 times
...
Lemuel
4 months ago
I recall that Chosen-Stego Attacks involve selecting specific images to hide data, but I’m not confident if that applies here.
upvoted 0 times
...
Reid
4 months ago
I feel like the techniques Victor used are more about manipulating the image rather than detecting hidden information. Maybe it's a Steg-Only Attack?
upvoted 0 times
...
Blythe
4 months ago
This seems similar to a practice question we had on Active Attacks. I think it might be related to that, but I could be wrong.
upvoted 0 times
...
Ariel
5 months ago
I remember studying the different types of Steganography attacks, but I'm not entirely sure which one fits Victor's techniques.
upvoted 0 times
...
Dean
5 months ago
I'm not entirely sure about this, but I'm leaning towards Chosen-Stego Attack. The image processing steps seem aimed at analyzing the steganographic content rather than just detecting its presence.
upvoted 0 times
...
Lenna
5 months ago
I'm feeling pretty confident about this one. The combination of smoothing, noise reduction, and image manipulation techniques points to a Stegdetect Attack.
upvoted 0 times
...
Dona
5 months ago
Okay, I think I've got this. The techniques described sound like they're trying to detect and extract hidden information, so I'm going to go with Steg-Only Attack.
upvoted 0 times
...
Celestina
5 months ago
Hmm, I'm a bit confused by the wording here. I'll need to make sure I understand the differences between the attack types before selecting an answer.
upvoted 0 times
...
Lonna
5 months ago
This seems like a tricky question. I'll need to carefully review the techniques mentioned and think through the different types of steganography attacks.
upvoted 0 times
...
Omega
5 months ago
This seems straightforward to me. The question states that a full risk-based testing strategy has been applied, so the answer must be D. 97% of the risk items have been tested, with only 3% remaining.
upvoted 0 times
...
Viva
5 months ago
Okay, I've got this. Ned is looking for information and samples from the vendor, so an RFI is definitely the way to go. I'll make sure to emphasize that in my answer.
upvoted 0 times
...
Dottie
5 months ago
It's tricky because the loops seem a bit off. Didn't we look at something similar where we had to consider edge cases?
upvoted 0 times
...
Mary
5 months ago
Right, so back to A, D, and E then?
upvoted 0 times
...
Velda
5 months ago
Hmm, I'm a bit unsure about the "transfer balance" configuration. I'll need to double-check the details on that one to make sure I understand it correctly.
upvoted 0 times
...
Dominga
10 months ago
I'm going to go with 'Chosen-Stego Attack' for this one. Victor seems to be purposefully trying to extract the hidden information, rather than just passively detecting it.
upvoted 0 times
...
Mona
10 months ago
Haha, Victor's like a secret agent, trying to uncover that hidden message! I bet he's having fun with all those image manipulation techniques. Just don't get too carried away, dude!
upvoted 0 times
German
9 months ago
C) Steg-Only Attack
upvoted 0 times
...
Leonida
9 months ago
B) Chosen-Stego Attack
upvoted 0 times
...
Una
9 months ago
A) Stegdetect Attack
upvoted 0 times
...
...
Sanjuana
10 months ago
Reducing noise, sharpening, and softening the image? Sounds like Victor is really trying to enhance the image to get a better look at that hidden data. I'll guess 'Steg-Only Attack' for this one.
upvoted 0 times
Lenny
9 months ago
Yes, reducing noise and sharpening the image can help reveal hidden data.
upvoted 0 times
...
Elizabeth
9 months ago
I agree, he seems to be focusing on enhancing the image.
upvoted 0 times
...
Jamey
9 months ago
I think Victor is using the Steg-Only Attack.
upvoted 0 times
...
...
Maryann
10 months ago
Hmm, I'm not sure which attack this is. The options sound a bit like multiple choice exam questions. Time to brush up on my Steganography knowledge!
upvoted 0 times
Natalya
8 months ago
D) Active Attacks
upvoted 0 times
...
Lura
8 months ago
C) Steg-Only Attack
upvoted 0 times
...
Toshia
8 months ago
B) Chosen-Stego Attack
upvoted 0 times
...
Veronika
9 months ago
A) Stegdetect Attack
upvoted 0 times
...
...
Sherita
10 months ago
Wow, Victor seems to be doing a thorough job with those Steganography techniques. I bet he's going to find that hidden information in no time!
upvoted 0 times
...
Kris
10 months ago
I'm not sure, but I think it could also be the Steg-Only Attack based on the methods Victor mentioned.
upvoted 0 times
...
Catalina
10 months ago
I agree with Silva, the techniques Victor used align with the Chosen-Stego Attack.
upvoted 0 times
...
Silva
11 months ago
I think Victor is using the Chosen-Stego Attack.
upvoted 0 times
...
Carmen
11 months ago
I agree with Keith, Victor's techniques seem more aligned with Chosen-Stego Attack.
upvoted 0 times
...
Keith
11 months ago
I believe Victor is actually using Chosen-Stego Attack.
upvoted 0 times
...
Isidra
11 months ago
I think Victor is using Steg-Only Attack.
upvoted 0 times
...

Save Cancel