exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 536 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 536
Topic #: 1
[All 312-49v10 Questions]

In which of these attacks will a steganalyst use a random message to generate a stego-object by using some steganography tool, to find the steganography algorithm used to hide the information?

  • A. Chosen-message attack
  • B. Known-cover attack
  • C. Known-message attack
  • D. Known-stego attack
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️
Reference:
https://www.giac.org/paper/gsec/707/steganalysis-overview/101589
(3)

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
aqeel1506
10 months, 3 weeks ago
A. Chosen-message attack The textbook defines a Chosen-message attack as one where the attacker selects a message to be hidden and then uses this information to analyze and deduce the steganography algorithm used. This method helps in understanding how the algorithm works by observing how the chosen message is embedded.
upvoted 1 times
...
Elb
1 year, 1 month ago
A< Chosen message attack. The steganalyst generates a stego-object from some Steganography tool or algorithm from a chosen message. The goal in this attack is to determine corresponding patterns in the stego-object that may point to the use of specific Steganography tools or algorithms. (This is the most powerful attack.)
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...