Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?
A.
Steganography
B.
Worm
C.
Trojan horse
D.
Virus
Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?
Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?
A.
Steganography
B.
Worm
C.
Trojan horse
D.
Virus