Multiple Choice
Bill seems to be connected to every marketing project that has had information leaked to the same competitor. Someone notices on a myspace page some photographs of Bill socializing with some executives of that competitor. Bill is sent on vacation for a week, and a supervisor access Bill's email and notices repeated emails with silly documents attached like jokes, random lists, or cooking recipe's.
He asks you if this seems suspicious and wonders if these are coded messages. You tell him it is even easier than that, and suspect which of the following techniques?
A) ADS Streams are being used to smuggle documents using a USB key
B) Steganography is being used to tunnel the secrets through the VPN
C) this host was compromised by foreign hackers and Bill is the real victim
D) snow.exe could be used to hide data inside the attached documents
Correct Answer:

Verified
Correct Answer:
Verified
Q5: A common technique when compromising Linux hosts
Q6: The act of stealing information from a
Q7: Which of the following is the static
Q8: In order to speed up the process
Q9: It is possible to run critical services
Q11: As a technique, rootkits hide processes and
Q12: Which of the following is not a
Q13: Marco wants to encode data into a
Q14: Ernest finds a laptop that seems to
Q15: Some versions of Windows Servers use a