In which step Steganography fits in CEH System Hacking Cycle (SHC)

In which step Steganography fits in CEH System Hacking Cycle (SHC)

In which step Steganography fits in CEH System Hacking Cycle (SHC)

A.
Step 2: Crack the password
B.
Step 1: Enumerate users

C.
Step 3: Escalate privileges

D.
Step 4: Execute applications

E.
Step 5: Hide files

F.
Step 6: Cover your tracks



Leave a Reply 14

Your email address will not be published. Required fields are marked *


Anonymous

Anonymous

The “answers” to this questions are not correct.

cristina

cristina

Should it be only Step 5: Hide files ?

moosey

moosey

you could maybe make an arguement for 6: Cover tracks

Kinan

Kinan

Guys, the answer is B

Buz

Buz

For me E is the right answer.

AnonymousToo

AnonymousToo

E. Hide Files

Abdullah

Abdullah

For me “E” too

ed

ed

This is a blatantly easy question. The Answer is E

Ahmed

Ahmed

E is the right answer

eddie guerrero

eddie guerrero

E. you don’t even have to know the cycle, just know what stenography means and you could guess it.

Chino

Chino

Please fix it to show E “Hide Files” as the only answer. As bambam said, it clearly shows in his link and in my book that is E only.

networkmanagers

networkmanagers

fixed

Alberts

Alberts

F: Covering Tracks