A website administrator has received an alert from an application designed to check the integrity of the company's website. The alert indicated that the hash value for a particular MPEG file has changed. Upon further investigation, the media appears to be the same as it was before the alert.Which of the following methods has MOST likely been used?

A. Cryptography
B. Time of check/time of use
C. Man in the middle
D. Covert timing
E. Steganography

Answer: E. Steganography

Computer Science & Information Technology

You might also like to view...

The file extension used for a chart template is ________

A) .xml B) .xlsx C) .xltx D) .crtx

Computer Science & Information Technology

A(n) _______ operator has only one operand.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology