Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIH Topic 5 Question 10 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 10
Topic #: 5
[All GCIH Questions]

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant

color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Dominga
1 months ago
I'm going to go with 'Chosen-Stego Attack' for this one. Victor seems to be purposefully trying to extract the hidden information, rather than just passively detecting it.
upvoted 0 times
...
Mona
1 months ago
Haha, Victor's like a secret agent, trying to uncover that hidden message! I bet he's having fun with all those image manipulation techniques. Just don't get too carried away, dude!
upvoted 0 times
German
16 days ago
C) Steg-Only Attack
upvoted 0 times
...
Leonida
17 days ago
B) Chosen-Stego Attack
upvoted 0 times
...
Una
20 days ago
A) Stegdetect Attack
upvoted 0 times
...
...
Sanjuana
2 months ago
Reducing noise, sharpening, and softening the image? Sounds like Victor is really trying to enhance the image to get a better look at that hidden data. I'll guess 'Steg-Only Attack' for this one.
upvoted 0 times
Lenny
12 days ago
Yes, reducing noise and sharpening the image can help reveal hidden data.
upvoted 0 times
...
Elizabeth
16 days ago
I agree, he seems to be focusing on enhancing the image.
upvoted 0 times
...
Jamey
1 months ago
I think Victor is using the Steg-Only Attack.
upvoted 0 times
...
...
Maryann
2 months ago
Hmm, I'm not sure which attack this is. The options sound a bit like multiple choice exam questions. Time to brush up on my Steganography knowledge!
upvoted 0 times
Natalya
6 days ago
D) Active Attacks
upvoted 0 times
...
Lura
7 days ago
C) Steg-Only Attack
upvoted 0 times
...
Toshia
8 days ago
B) Chosen-Stego Attack
upvoted 0 times
...
Veronika
1 months ago
A) Stegdetect Attack
upvoted 0 times
...
...
Sherita
2 months ago
Wow, Victor seems to be doing a thorough job with those Steganography techniques. I bet he's going to find that hidden information in no time!
upvoted 0 times
...
Kris
2 months ago
I'm not sure, but I think it could also be the Steg-Only Attack based on the methods Victor mentioned.
upvoted 0 times
...
Catalina
2 months ago
I agree with Silva, the techniques Victor used align with the Chosen-Stego Attack.
upvoted 0 times
...
Silva
2 months ago
I think Victor is using the Chosen-Stego Attack.
upvoted 0 times
...
Carmen
2 months ago
I agree with Keith, Victor's techniques seem more aligned with Chosen-Stego Attack.
upvoted 0 times
...
Keith
2 months ago
I believe Victor is actually using Chosen-Stego Attack.
upvoted 0 times
...
Isidra
3 months ago
I think Victor is using Steg-Only Attack.
upvoted 0 times
...

Save Cancel