EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 5 : Defeating Anti-forensics Techniques
         
Questions available : 49 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 259  
   
Harold is a computer forensics investigator working for a consulting firm out of Atlanta Georgia. Harold is called upon to help with a corporate espionage case in Miami Florida. Harold assists in the investigation by pulling all the data from the computers allegedly used in the illegal activities. He finds that two suspects in the company where stealing sensitive corporate information and selling it to competing companies. From the email and instant messenger logs recovered, Harold has discovered that the two employees notified the buyers by writing symbols on the back of specific stop signs. This way, the buyers knew when and where to meet with the alleged suspects to buy the stolen material. What type of steganography did these two suspects use?


 
A:    Text semagram
 
B:    Visual semagram
C:    Grill cipher
 
D:    Visual cipher
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer




















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations