Q.1
_____________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.
  • a) Cryptography
  • b) Steganography
  • c) Tomography
  • d) Chorography
Q.2
_____________ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files.
  • a) Cryptography
  • b) Tomography
  • c) Steganography
  • d) Chorography
Q.3
Steganography follows the concept of security through obscurity.
  • a) True
  • b) False
Q.4
The word ________________is a combination of the Greek words ‘steganos’ which means “covered or concealed”, and ‘graphein’ which means “writing”.
  • a) Cryptography
  • b) Tomography
  • c) Steganography
  • d) Chorography
Q.5
A ________________ tool permits security professional or a hacker to embed hidden data within a carrier file like an image or video which can later be extracted from them.
  • a) Cryptography
  • b) Tomography
  • c) Chorography
  • d) Steganography
Q.6
Which of the following is not a steganography tool?
  • a) Xaio steganography
  • b) Image steganography
  • c) ReaperExploit
  • d) Steghide
Q.7
Which of the following is not a steganography tool?
  • a) Crypture
  • b) SteganographX Plus
  • c) rSteg
  • d) Burp Suite
Q.8
The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________
  • a) special file
  • b) ordinary file
  • c) program file
  • d) encrypted file
Q.9
People will normally think it as a normal/regular file and your secret message will pass on without any _______________
  • a) suspicion
  • b) decryption
  • c) encryption
  • d) cracking
Q.10
By using ______________ you can diminish the chance of data leakage.
  • a) Cryptography
  • b) Tomography
  • c) Chorography
  • d) Steganography
0 h : 0 m : 1 s