A penetration tester wants to validate the effectiveness of a DLP product by attempting exfiltration of data using email attachments. Which of the following techniques should the tester select to accomplish this task?
A. Steganography
Steganography is the practice of hiding information within other data, such as images, audio, or video files. A penetration tester could use steganography to attempt exfiltration of data by hiding sensitive information within email attachments and then trying to send it through the email system. This test can be used to validate the effectiveness of the DLP product by attempting to detect if the DLP system is able to detect the hidden data before it gets exfiltrated.
Option B, Metadata removal, doesn't actually help exfiltrating the data, it just removes metadata that could reveal information about the file. Option C, Encryption, is not effective for exfiltration since it's used to protect the data from being intercepted and read by unauthorized parties. Option D, Encode64, is a way to encode data in base64, but it doesn't hide the data, it can make the data unreadable but doesn't hide it.
A, the keys word in the question is are exfiltration in email attachments which I think stuffing data in images or other files rather than traditional encryption.
I think people rarely think of steganography, so the most straightforward and common way of filtering info, is encryption, think word document with password protection, so the DLP product can't inspect it.
Encryption involves transforming data into a coded format that can only be read or processed after decryption using a specific key. In the context of attempting data exfiltration via email attachments, encrypting the content of the attachments can be an effective way to bypass or test the DLP product's ability to detect sensitive data leaving the network.
Steganography: Steganography involves concealing data within other data (like hiding messages within images or files). While it can be used for covert communication, it might not directly validate the DLP product's effectiveness in detecting sensitive data leaving the network via email attachments.
read the question carefully. I believe C is the correct answer
A. Steganography
Explanation:
Option A: Steganography is the practice of hiding information within other non-sensitive information. By embedding the data to be exfiltrated within an innocent-looking file (such as an image), the tester can attempt to bypass the DLP's detection mechanisms. This would be an effective way to test whether the DLP product can detect such concealed exfiltration attempts.
Steganography is the practice of hiding secret information within another piece of data, such as an image, audio file, or video, in such a way that it is difficult or impossible to detect. While steganography can be used in combination with encryption, it is not a form of encryption itself.
In the context of the question, the penetration tester wants to validate the effectiveness of a DLP (Data Loss Prevention) product by attempting exfiltration of data using email attachments. To accomplish this, the tester would want to use a technique that attempts to bypass the DLP product and successfully exfiltrate the data. Steganography, which involves hiding the data within another file, would not necessarily accomplish this goal on its own. Instead, the tester would want to use a technique such as encryption or encoding to attempt to bypass the DLP product and successfully exfiltrate the data. Therefore, the correct answer is C.
A - Steganography. This is hiding of information within another data like images. The images can be sent out of the organisation using email system assuming there are policies against the use of external drives and USB devices.
This section is not available anymore. Please use the main Exam Page.PT0-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
RRabbit_111
Highly Voted 1 year, 9 months agobeamage
1 year, 8 months agohitagitore
Most Recent 4 months agoPMann
7 months, 1 week agoElDirec
9 months, 1 week agostephyfresh13
10 months, 3 weeks agosolutionz
1 year, 2 months ago[Removed]
1 year, 6 months agoAaronS1990
1 year, 7 months agokenechi
1 year, 8 months ago[Removed]
1 year, 7 months agoBABrendan
1 year, 9 months agocy_analyst
1 year, 8 months ago[Removed]
1 year, 8 months ago[Removed]
1 year, 8 months agomasso435
1 year, 11 months agokmanb
1 year, 9 months ago