Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?

Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?

Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?

A.
Steganography

B.
Worm

C.
Trojan horse

D.
Virus



Leave a Reply 0

Your email address will not be published. Required fields are marked *