Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIH Topic 5 Question 10 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 10
Topic #: 5
[All GCIH Questions]

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant

color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Kris
2 days ago
I'm not sure, but I think it could also be the Steg-Only Attack based on the methods Victor mentioned.
upvoted 0 times
...
Catalina
5 days ago
I agree with Silva, the techniques Victor used align with the Chosen-Stego Attack.
upvoted 0 times
...
Silva
6 days ago
I think Victor is using the Chosen-Stego Attack.
upvoted 0 times
...
Carmen
8 days ago
I agree with Keith, Victor's techniques seem more aligned with Chosen-Stego Attack.
upvoted 0 times
...
Keith
10 days ago
I believe Victor is actually using Chosen-Stego Attack.
upvoted 0 times
...
Isidra
17 days ago
I think Victor is using Steg-Only Attack.
upvoted 0 times
...

Save Cancel