exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 160 discussion

Actual exam question from CompTIA's PT0-002
Question #: 160
Topic #: 1
[All PT0-002 Questions]

A penetration tester wants to validate the effectiveness of a DLP product by attempting exfiltration of data using email attachments. Which of the following techniques should the tester select to accomplish this task?

  • A. Steganography
  • B. Metadata removal
  • C. Encryption
  • D. Encode64
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RRabbit_111
Highly Voted 1 year, 9 months ago
A. Steganography Steganography is the practice of hiding information within other data, such as images, audio, or video files. A penetration tester could use steganography to attempt exfiltration of data by hiding sensitive information within email attachments and then trying to send it through the email system. This test can be used to validate the effectiveness of the DLP product by attempting to detect if the DLP system is able to detect the hidden data before it gets exfiltrated. Option B, Metadata removal, doesn't actually help exfiltrating the data, it just removes metadata that could reveal information about the file. Option C, Encryption, is not effective for exfiltration since it's used to protect the data from being intercepted and read by unauthorized parties. Option D, Encode64, is a way to encode data in base64, but it doesn't hide the data, it can make the data unreadable but doesn't hide it.
upvoted 8 times
beamage
1 year, 8 months ago
CompTIA Loves their Steganography
upvoted 6 times
...
...
hitagitore
Most Recent 4 months ago
Selected Answer: A
From my work experience, both encryption would 100% trigger a DLP alert, so that rules out C and D. which only leaves A Steganography
upvoted 1 times
...
PMann
7 months, 1 week ago
A, the keys word in the question is are exfiltration in email attachments which I think stuffing data in images or other files rather than traditional encryption.
upvoted 2 times
...
ElDirec
9 months, 1 week ago
Selected Answer: B
I think people rarely think of steganography, so the most straightforward and common way of filtering info, is encryption, think word document with password protection, so the DLP product can't inspect it.
upvoted 1 times
...
stephyfresh13
10 months, 3 weeks ago
Encryption involves transforming data into a coded format that can only be read or processed after decryption using a specific key. In the context of attempting data exfiltration via email attachments, encrypting the content of the attachments can be an effective way to bypass or test the DLP product's ability to detect sensitive data leaving the network. Steganography: Steganography involves concealing data within other data (like hiding messages within images or files). While it can be used for covert communication, it might not directly validate the DLP product's effectiveness in detecting sensitive data leaving the network via email attachments. read the question carefully. I believe C is the correct answer
upvoted 1 times
...
solutionz
1 year, 2 months ago
Selected Answer: A
A. Steganography Explanation: Option A: Steganography is the practice of hiding information within other non-sensitive information. By embedding the data to be exfiltrated within an innocent-looking file (such as an image), the tester can attempt to bypass the DLP's detection mechanisms. This would be an effective way to test whether the DLP product can detect such concealed exfiltration attempts.
upvoted 1 times
...
[Removed]
1 year, 6 months ago
Selected Answer: C
Steganography is the practice of hiding secret information within another piece of data, such as an image, audio file, or video, in such a way that it is difficult or impossible to detect. While steganography can be used in combination with encryption, it is not a form of encryption itself. In the context of the question, the penetration tester wants to validate the effectiveness of a DLP (Data Loss Prevention) product by attempting exfiltration of data using email attachments. To accomplish this, the tester would want to use a technique that attempts to bypass the DLP product and successfully exfiltrate the data. Steganography, which involves hiding the data within another file, would not necessarily accomplish this goal on its own. Instead, the tester would want to use a technique such as encryption or encoding to attempt to bypass the DLP product and successfully exfiltrate the data. Therefore, the correct answer is C.
upvoted 1 times
...
AaronS1990
1 year, 7 months ago
Selected Answer: A
Steganography- Specifically the Steghide tool
upvoted 1 times
...
kenechi
1 year, 8 months ago
Selected Answer: A
A - Steganography. This is hiding of information within another data like images. The images can be sent out of the organisation using email system assuming there are policies against the use of external drives and USB devices.
upvoted 4 times
[Removed]
1 year, 7 months ago
Yes A is correct
upvoted 2 times
...
...
BABrendan
1 year, 9 months ago
ChatGPT agrees with RRabbit and kmanb....maybe RRabbit and kmanb are chatgpt!
upvoted 4 times
cy_analyst
1 year, 8 months ago
for me chatGPT says C. Encryption
upvoted 2 times
[Removed]
1 year, 8 months ago
A is corret
upvoted 2 times
[Removed]
1 year, 8 months ago
Correct
upvoted 2 times
...
...
...
...
masso435
1 year, 11 months ago
Selected Answer: B
All other answers are a form of encryption or randomizing the data.
upvoted 2 times
kmanb
1 year, 9 months ago
A is the answer my guy
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago