In which step Steganography fits in CEH System Hacking Cycle (SHC)
A.
Step 2: Crack the password
B.
Step 1: Enumerate users
C.
Step 3: Escalate privileges
D.
Step 4: Execute applications
E.
Step 5: Hide files
F.
Step 6: Cover your tracks
In which step Steganography fits in CEH System Hacking Cycle (SHC)
In which step Steganography fits in CEH System Hacking Cycle (SHC)
A.
Step 2: Crack the password
B.
Step 1: Enumerate users
C.
Step 3: Escalate privileges
D.
Step 4: Execute applications
E.
Step 5: Hide files
F.
Step 6: Cover your tracks
The “answers” to this questions are not correct.
Should it be only Step 5: Hide files ?
you could maybe make an arguement for 6: Cover tracks
Guys, the answer is B
For me E is the right answer.
E. Hide Files
For me “E” too
http://www.scribd.com/doc/70789592/5/Overview-of-System-Hacking-Cycle
option E for me
This is a blatantly easy question. The Answer is E
E is the right answer
E. you don’t even have to know the cycle, just know what stenography means and you could guess it.
Please fix it to show E “Hide Files” as the only answer. As bambam said, it clearly shows in his link and in my book that is E only.
fixed
F: Covering Tracks