A security analyst has been notified that trade secrets are being leaked from one of the executives in the corporation. When reviewing this executive's laptop they notice several pictures of the employee's pets are on the hard drive and on a cloud storage network. When the analyst hashes the images on the hard drive against the hashes on the cloud network they do not match. Which of the following describes how the employee is leaking these secrets?
A. Social engineering
B. Steganography
C. Hashing
D. Digital signatures
Answer: B. Steganography
Computer Science & Information Technology
You might also like to view...
Game development jobs typically are divided into two paths: designers and ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Put the following equations into the slop-intercept form (y = + b) and read the value of the slope and y-intercept.
2y = 6x -I- 4 y = 3x + 2 Slope = +3
Computer Science & Information Technology
In the accompanying image of Microsoft Excel 2016, box "A" points to a(n) _____.?
?
A. ?exploded pie B. ?embedded pie C. ?75 degree pie D. ?270 degree pie
Computer Science & Information Technology
A(n) _____________________ in a chart is a grid containing the chart's underlying worksheet data.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology