Which among the following is correct:
a) Traffic Analysis is the analysis of patterns of communication in order to learn secret
information.
b) Steganography is the study of hiding the very existence of a message, and not necessarily
the
contents of the message itself like microdots or invisible ink.
c) Both of Above
d) None of These

1 Answer

Answer :

c) Both of Above

Related questions

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing

Last Answer : B. Steganography. 

Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing.

Last Answer : Acquisition.

Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing. 

Last Answer : A. Acquisition. 

Description : Cryptography is the study of information______: a) Hiding b) Verification c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Cryptography is the study of information______: a) Hiding b) Verification c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Pick up the correct statement from the following (A) The contour lines having the same elevation cannot unite and continue as one line (B) A contour can not end abruptly, but must ultimately close itself not ... slope at a point on a contour is at right angles to the contour (D) All the above

Last Answer : (D) All the above

Description : Why is the very existence of spy agencies not being kept a secret?

Last Answer : I believe most of the new spy’s , in the world, are the lone wolf spy.

Description : What are the best common household hiding places for secret stuff?

Last Answer : I could tell you. But then I’d have to kill you.

Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates

Last Answer : a. hashing algorithms

Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates

Last Answer : (a) Hashing algorithms

Description : When sending an e-mail, the _____ line describes the contents of the message. 1) to 2) subject 3) contents 4) CC 5) None of these

Last Answer : Answer :2

Description : When sending an e-mail, the _____line describe the contents of the message: a) Subject b) Contents c) CC d) None of These

Last Answer : a) Subject

Description : When sending an e-mail, the … line describe the contents of the message a) Subject b) To c) Contents d) CC e) None of these

Last Answer : a) Subject

Description : For teachers, parents of young kids and playful folks: Can you tell me how to make and use invisible ink?

Last Answer : I did this as a kid. Water and lemon juice. Heat the paper with a hair dryer after the juice dries and it will show what’s written.

Description : How can i make invisible ink?

Last Answer : I don’t know that you can make it, but to get you on the right track, I believe you are actually asking about disappearing ink.

Description : Invisible Ink with Lemon Juice

Last Answer : Invisible Ink with Lemon Juice Making invisible ink is a lot of fun, you can pretend you are a secret agent as you keep all your secret codes and messages hidden from others. All you need ... ink can also be made using chemical reactions or by viewing certain liquids under ultraviolet (UV) light.

Description : How To Make An Invisible Ink

Last Answer : Ingredients: Lemon juice Instructions: Quick and easy… just use a toothpick or fine brush to ‘write’ your secret message on a piece of paper. To make the message appear, hold the paper over a lightbulb or toaster.

Description : Assertion (A): For an effective classroom communication at times it is desirable to use the projection technology. Reason (R): Using the projection technology facilitates extensive coverage of course contents. (A) Both (A) and (R) ... ) is true, but (R) is false. (D) (A) is false, but (R) is true.

Last Answer : (B) Both (A) and (R) are true, but (R) is not the correct explanation.

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : If the contents of an accumulator are Ex-ORed with itself and placed in the accumulator itself, then  A) Carry flag will be set B) The accumulator contains all 1’s C) The zero flag is set D) The accumulator contents are shifted left by one bit

Last Answer : If the contents of an accumulator are Ex-ORed with itself and placed in the accumulator itself, then The zero flag is set 

Description : The science of the study of feedback systems in humans, animals and machines is known as: (A) cybernetics (B) reverse communication (C) selectivity study (D) response analysis

Last Answer : Answer: A  Cybernetics is the study of communication and control processes in living organisms and machines. Cybernetics analyzes the ability of humans, animals, and some machines to respond to ... machines control their actions by telling them whether they are proceeding in the right direction. 

Description : And you only log in when you want to answer?

Last Answer : No, I'm not hiding, I don't need to be ashamed of my opinions. It feels like someone sends a letter and signs: a friend.

Description : Which among the following definitions are correct: a) Epistemology - It is a study of the kinds of knowledge that are required for solving problems in the world b) Ontology - It is the study of the ... basic properties are. Emphasis on ontology begins in the 1990s. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : What are some good books about basic steganography techniques?

Last Answer : I can recommend a good new novel that involves steganography—“Daemon” by Daniel Suarez. About the best tech thriller I’ve ever read.

Description : Which of these exemplifies social steganography?

Last Answer : Sending a hidden message to invite certain people to a party

Description : What is Steganography

Last Answer : Invisible ink writing 

Description : Which of the communication modes support two way traffic but in only once direction of a time? A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex

Last Answer : B) Half-duplex

Description : Marks and Spencer wants to learn about consumer attitudes toward mail order purchases and conducts a study to acquire this information, this study would best be classified as collecting _________data. A)casual B)experimental C)primary D)secondary

Last Answer : C)primary

Description : The forecasting method that uses the firm's historical sales data in an attempt to find patterns in the firm's sales volume over time is A)the regression method. B)customer forecasting. C)a market test. D)sales -force forecasting. E)time series analysis..

Last Answer : E)time series analysis..

Description : Which of the following RAM times have to be refreshed often in order to retain its contents ? 1) SIMM 2) DIMM 3) SDMM 4) DSMM

Last Answer : 2) DIMM

Description : In the early 1900's in England, there was two towns: town A and town B, and there was a huge river in between them. The only way across to each town was by a long bridge with a guard ... back. Many people have tried to cross but have always been caught, even very fast runners have only ab -Riddles

Last Answer : Did you get it? The answer is that they went up close to the guards tower, turned around and started walking back to the town they came from, the guard caught them and assumed that they came ... way and sent them back! Hope you enjoyed this, please subscribe and check back soon for more riddles!

Description : In the process of Communication, which one of the following is in the chronological order? (A) Communicator, Medium, Receiver, Effect, Message (B) Medium, Communicator, Message, Receiver, Effect (C) Communicator, Message, Medium, Receiver, Effect (D) Message, Communicator, Medium, Receiver, Effect

Last Answer : (C) Communicator, Message, Medium, Receiver, Effect

Description : Which of the following statements is incorrect for Parallel Virtual Machine (PVM)? (A) The PVM Communication model provides asynchronous blocking send, asynchronous blocking receive and non-blocking receive function. ... of such messages. (D) In PVM Model, the message order is not preserved. 

Last Answer : (D) In PVM Model, the message order is not preserved.

Description : Ratio analysis is a study of relationship among various --------------- factors in a business a) Operational b) Official c) Financial d) Others

Last Answer : c) Financial

Description : The contents of information are stored in A) Memory data register B) Memory address register C) Memory arithmetic registers D) Memory access register

Last Answer : Answer : A

Description : The contents of information are stored in _______: a) Memory Data Register b) Memory Address Register c) Memory Access Register d) Memory Arithmetic Register e) None of The Above

Last Answer : a) Memory Data Register

Description : The contents of information are stored in --- 1) Memory data register 2) Memory address register 3) Memory access register 4) Memory arithmetic register

Last Answer : 1) Memory data register

Description : On a T.V. channel, four serials A, B, C and D were screened, one on eacn day, on four consecutive days but not necessarily in that order. On which day was the serial C screened ? Statements: I ... (I) and (II) together are not sufficient (d) Both statements (I) and (II) together are necessary

Last Answer : (c) Both statements (I) and (II) together are not sufficient

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B.Steganogrhy. C.Liveanalysis D. Hashing

Last Answer : B.Steganogrhy.

Description : Truly effective communication: 1. Depends on using multiple channels  2. Depends on selecting the right method for each message and avoiding duplication, since  everyone is overloaded with information  3. ... misunderstood  4. Can only be achieved by communication professional  5. a, b and c

Last Answer : 5. a, b and c

Description : Which of the following statements is not connected with communication? (A) Medium is the message. (B) The world is an electronic cocoon. (C) Information is power. (D) Telepathy is technological.

Last Answer : (D) Telepathy is technological.

Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.

Last Answer : 1) It serves as the largest one-line information system

Description : Which one among the following is not a characteristic of a deductive type of argument ? (A) The conclusion follows from the premise/premises necessarily. (B) The argument admits degree of complexity. ( ... provides us knowledge about matters of fact. (D) The argument must be either valid or invalid.

Last Answer : (C) The argument provides us knowledge about matters of fact.

Description : I am 1 of 4 children who's mother died and left no will, to our knowledge. Her surviving spouse has cut off all communication with us, and we have not received any of the personal items he said we were to receive, including contents of a safety deposit bo?

Last Answer : Seek legal counsel.

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm