An investigator is analyzing an attack in which malicious files were loaded on the network and were undetected. Several of the images received during the attack include repetitive patterns.
Which anti-forensic technique was used?
A . spoofing
B . obfuscation
C . tunneling
D . steganography
Answer: D
Explanation:
Reference:
https://doi.org/10.5120/1398-1887
https://www.carbonblack.com/blog/steganography-in-the-modern-attack-landscape/
Latest 300-215 Dumps Valid Version with 59 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund