Sean suspects that an individual in his company is smuggling out secret information despite his company's careful use of data loss prevention systems. He discovers that the suspect is posting photos, including the one shown here, to public Internet message boards. What type of technique may the individuals be using to hide messages inside this image?

A. Watermarking
B. VPN
C. Steganography
D. Covert timing channel


Answer: C. Steganography

Computer Science & Information Technology

You might also like to view...

The Table Tools Layout tab is a contextual tab and only displays when a table is selected

Indicate whether the statement is true or false

Computer Science & Information Technology

how would you write the same prototype using a call by reference using reference parameters?

If a function prototype using a call by reference using pointers is int CalcInfo(float * p1, float * p2); A. int CalcInfo(float p1, float p2); B. int CalcInfo(float r1, float r2); C. int CalcInfo(&*p1, &*p2); D. int CalcInfo(float &r1, float &r2);

Computer Science & Information Technology

A series of text links across the top or bottom of a webpage is called the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Any type of multimedia file or program that you can add to your Web pages is known as a(n) ____.

A. embedded object B. plug-in C. browser formatter D. control structure.

Computer Science & Information Technology