Harold is a computer forensics investigator working for a consulting firm out of Atlanta Georgia. Harold is called upon to help with a corporate espionage case in Miami Florida. Harold assists in the investigation by pulling all the data from the computers allegedly used in the illegal activities. He finds that two suspects in the company where stealing sensitive corporate information and selling it to competing companies. From the email and instant messenger logs recovered, Harold has discovered that the two employees notified the buyers by writing symbols on the back of specific stop signs. This way, the buyers knew when and where to meet with the alleged suspects to buy the stolen material. What type of steganography did these two suspects use?
A) Text semagram
B) Visual semagram
C) Grill cipher
D) Visual cipher
Correct Answer:
Verified
Q43: Harold is finishing up a report on
Q44: Paraben Lockdown device uses which operating system
Q45: Why would you need to find out
Q46: What must be obtained before an investigation
Q47: What type of attack sends spoofed UDP
Q49: What type of attack sends SYN requests
Q50: While looking through the IIS log file
Q51: What feature of Windows is the following
Q52: What stage of the incident handling process
Q53: What is the CIDR from the following
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents