A website administrator has received an alert from an application designed to check the integrity of the company's website. The alert indicated that the hash value for a particular MPEG file has changed. Upon further investigation, the media appears to be the same as it was before the alert.Which of the following methods has MOST likely been used?

A. Cryptography
B. Time of check/time of use
C. Man in the middle
D. Covert timing
E. Steganography


Answer: E. Steganography

Computer Science & Information Technology

You might also like to view...

XML and XSL files are combined in a(n) _______, where they’re converted to HTML for display in a browser.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Viewing ____ is helpful if you are not sure how text boxes are linked and how text is flowing in a document.

A. flow threads B. flow lines C. text lines D. text threads

Computer Science & Information Technology

When a placeholder in PowerPoint is first active, it displays a ________ line around the edge

A) dashed B) dotted C) solid D) double solid

Computer Science & Information Technology

Match the following flick gestures with their results

I. Diagonally to upper left II. Diagonally to upper right III. Diagonally to lower left IV. Diagonally to lower right A. Undo B. Delete C. Paste D. Copy

Computer Science & Information Technology