In which step Steganography fits in CEH System Hacking Cycle (SHC)

In which step Steganography fits in CEH System Hacking Cycle (SHC)

A.
Step 2: Crack the password
B.
Step 1: Enumerate users

C.
Step 3: Escalate privileges

D.
Step 4: Execute applications

E.
Step 5: Hide files

F.
Step 6: Cover your tracks

Discussion

14 Responses to “In which step Steganography fits in CEH System Hacking Cycle (SHC)”

  1. Anonymous says:

    The “answers” to this questions are not correct.

  2. cristina says:

    Should it be only Step 5: Hide files ?

  3. moosey says:

    you could maybe make an arguement for 6: Cover tracks

  4. Kinan says:

    Guys, the answer is B

  5. Buz says:

    For me E is the right answer.

  6. AnonymousToo says:

    E. Hide Files

  7. Abdullah says:

    For me “E” too

  8. ed says:

    This is a blatantly easy question. The Answer is E

  9. Ahmed says:

    E is the right answer

  10. eddie guerrero says:

    E. you don’t even have to know the cycle, just know what stenography means and you could guess it.

  11. Chino says:

    Please fix it to show E “Hide Files” as the only answer. As bambam said, it clearly shows in his link and in my book that is E only.

  12. Alberts says:

    F: Covering Tracks

Leave a Reply