adplus-dvertising
frame-decoration

Question

The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________

a.

special file

b.

ordinary file

c.

program file

d.

encrypted file

Posted under Cyber Security

Answer: (b).ordinary file

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________

Similar Questions

Discover Related MCQs

Q. Which of the following is not a steganography tool ?

Q. Which of the following is not a steganography tool?

Q. A ________________ tool permits security professional or a hacker to embed hidden data within a carrier file like an image or video which can later be extracted from them.

Q. The word ________________is a combination of the Greek words ‘steganos’ which means “covered or concealed”, and ‘graphein’ which means “writing”.

Q. Steganography follows the concept of security through obscurity.

Q. _____________ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files.

Q. _____________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.

Q. AES is at least 6-times faster than 3-DES.

Q. AES stands for ________________

Q. ____________ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.

Q. DES stands for ________________

Q. Data Encryption Standard is implemented using the Feistel Cipher which employs 16 round of Feistel structure.

Q. Which of the following is not an example of a block cipher?

Q. The procedure to add bits to the last block is termed as _________________

Q. In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.

Q. In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.

Q. The ________________ has piece of the keyword that has the same length as that of the plaintext.

Q. ______________ employs a text string as a key that is implemented to do a series of shifts on the plain-text.

Q. In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.

Q. ________________ is a cipher formed out of substitution where for a given key-value the cipher alphabet for every plain text remains fixed all through the encryption procedure.