A security audit identifies a number of large email messages being sent by a specific user from their company email account to another address external to the company. These messages were sent prior to a company data breach, which prompted the security audit. The user was one of a few people who had access to the leaked data. Review of the suspect's emails show they consist mostly of pictures of the user at various locations during a recent vacation. No suspicious activities from other users who have access to the data were discovered. Which of the following is occurring?
A. The user is encrypting the data in the outgoing messages.
B. The user is using steganography.
C. The user is spamming to obfuscate the activity.
D. The user is using hashing to embed data in the emails.
Answer: B. The user is using steganography.
You might also like to view...
The Paragraph Dialog Box can be opened from _____ tab.
A. only the HOME B. either the HOME or PAGE LAYOUT C. only the PAGE LAYOUT D. only the VIEW
Where are data variables stored when a program is running?
What will be an ideal response?
Which of the following is NOT a typical function performed by the OS installation program?
A. gathering system information B. backing up existing data C. configuring devices and drivers D. restarting the system
Which of the following would most likely be responsible for configuring firewalls and IDPSs, implementing security software, and diagnosing and troubleshooting problems?
A. security technician B. security analyst C. security consultant D. security manager