Multiple Choice
A corporate spy copies proprietary information into a text file and then hides the text file in an image file.The image file is then posted on the company's web site for others who know where to look to extract the information.This is the example of the use of
A) Social engineering
B) Steganography
C) Cryptography
D) Cryptanalysis
Correct Answer:

Verified
Correct Answer:
Verified
Q37: What is key management and why is
Q38: The encryption method based on the idea
Q39: Keeping a copy of the encryption key
Q40: A _ is when a hash algorithm
Q41: A(n)_ is a step-by-step,recursive computational procedure for
Q43: Cryptographic algorithms are used for all of
Q44: An attacker is able to decrypt a
Q45: Keyspace refers to<br>A)The location where keys are
Q46: Hashing algorithms can be compromised<br>A)By a collision
Q47: The ROT13 cipher is an example of