Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 536 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 536
Topic #: 1
[All 312-49v10 Questions]

In which of these attacks will a steganalyst use a random message to generate a stego-object by using some steganography tool, to find the steganography algorithm used to hide the information?

  • A. Chosen-message attack
  • B. Known-cover attack
  • C. Known-message attack
  • D. Known-stego attack
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️
Reference:
https://www.giac.org/paper/gsec/707/steganalysis-overview/101589
(3)

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
aqeel1506
4 months ago
A. Chosen-message attack The textbook defines a Chosen-message attack as one where the attacker selects a message to be hidden and then uses this information to analyze and deduce the steganography algorithm used. This method helps in understanding how the algorithm works by observing how the chosen message is embedded.
upvoted 1 times
...
Elb
7 months, 1 week ago
A< Chosen message attack. The steganalyst generates a stego-object from some Steganography tool or algorithm from a chosen message. The goal in this attack is to determine corresponding patterns in the stego-object that may point to the use of specific Steganography tools or algorithms. (This is the most powerful attack.)
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...