Question: The attacker focuses on stopping the message transmission
The attacker is:
a. Active attacker
b. Proactive attacker
c. Passive attacker
d. Reactive attacker
Solution: Active attacker
Question: A proactive steps that can be taken to overcome active attacker are the following EXCEPT:
a. Use distortion steganography technique
b. Replicate the message on multiple location of the message
c. Encrypt the message
d. Use hash functions
Solution: Encrypt the message
Question: The attacker changes the format of every message that goes through his monitored channel
The attacker is:
a. Proactive attacker
b. Active attacker
c. Reactive attacker
d. Passive attacker
Solution: Active attacker
Question: The attacker focuses on message extraction instead of stopping the communication
The attacker is:
a. passive attacker
b. active attacker
c. reactive attacker
d. proactive attacker
Solution: passive attacker
Question: The following scenario can limit the type of media that can be used for steganography EXCEPT
a. Use external drive to sensitive information storage's machine
b. Configure ports connected to sensitive information storage to receive only mode
c. Restrict physical access and hardware to sensitive information's location
d. Configure the firewall to restrict specific filetypes from being transmitted
Solution: Use external drive to sensitive information storage's machine
Question: The attacker focuses on traffic analysis and user identification
The attacker is:
a. Passive attacker
b. Reactive attacker
c. Proactive attacker
d. Active attacker
Solution: Passive attacker
Question: A possible advantage scenario of steganography over cryptography is:
a. Message can be bigger than the carrier media
b. Message is hard to read because it is jumbled up
c. Messages are smaller than encrypted message
d. Message won't raise suspicion because everyone received it
Solution: Message won't raise suspicion because everyone received it
Question: Understanding the steganography triad is important when designing a stego-system because:
a. the strength of a stego-system could be known from the triad
b. the amount of payload could be known from the triad
c. the amount of robustness could be known from the triad
d. the amount of invisibility could be known from the triad
Solution: the strength of a stego-system could be known from the triad
Question: Steganography is different from cryptography because
a. Steganography is hashed and unreadable
b. Steganography looks like another media or message
c. Steganography is not anonymous
d. Steganography is faster than encryption
Solution: Steganography looks like another media or message
Question: Which of the following shows a scenario for a secure stego-system:-
1. Warden does not have the key to generate the stego-object.
2. The cover object is also the stego-object.
3. The stego-object is hard to differentiate than normal object.
4. The attacker is the agent that generates the stego-object.
Select one:
a. 3 and 4
b. 1 and 3
c. all of the above
d. 1 and 2
Solution: 1 and 3