欢迎访问第一题库!

(71)is the science of hiding information。Whereas the goal of cryptography is to make data unreadable

第一题库 分享 时间: 加入收藏

考试:高级软件水平考试

科目:(高级)信息系统项目管理师(在线考试)

问题:

(71)is the science of hiding information。Whereas the goal of cryptography is to make data unreadable by a third party。the goal of steganography is to hide the data from a third party。In this article,I will discuss what steganography is,what purposes it serves,and will provide an example using available software。  There are a large number of steganographic(2)that most of us are familiar with(especially if you watch a lot of spy movies),ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication。With computers and networks,there are many other ways of hiding informations,such as:  Covert channels(c,g,Loki and some distributed denial-of-service tools use the Internet Control(3)Protocol,or ICMP,as the communication channel between the“bad guy”and a compromicyed system)  Hidden text within Web pages  Hiding files in“plain sight”(c,g,what better place to“hide”a file than with an important sounding name in the c:winnt system32 directory)  Null ciphers(c,g,using the first letter of each word to form a hidden message in an otherwise innocuous text)  steganography today,however,is significantly more(4)than the example about suggest,allowing a user to hide large amounts of information within image and audio。These forms of steganography often are used in conjunction with cryptography so the information is double protected;first it is encrypted and then hidden so that an advertisement first。find the information(an often difficult task in and of itself)and the decrypted it。  The simplest approach to hiding data within an image file is called(5)signature insertion。In this method ,we can take the binary representation of the hidden data and the bit of each byte within the covert image。If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye。(74)处的单词应是
A:powerful
B:sophistication
C:advanced
D:easy

答案:


解析:


相关标签:

(高级)信息系统项目管理师     cryptography     information     项目管理     science     Whereas    

热门排序

推荐文章

【说明】某公司现有网络拓扑结构如图1-1所示。该网络中使用的交换机SW1为三层交换机,SW2和SW3均为二层智能交换机。【问题3】(4分)若内网用户IP地址的分配方式为自动分配,在设备R1上启用DHC 图中的(请作答此空)、( )、( )分别是什么( )。 Tel</th></tr><tr><td>' target='_blank' class='lb_2 chao f14'>有以下HTML 代码,在浏览器中显示的正确结果是()。<table border=”1"><tr><th>Name</th><th colspan=”2”'>Tel</th></tr><tr><td> 在磁盘上存储数据的排列方式会影响I/O服务的总时间。假设每磁道划分成10个物理块,每块存放1个逻辑记录。逻辑记录R1、R2、…、R10存放在同一个磁道上,记录的安排顺序如表1所示:假定磁盘的旋转速度为 题目请看图片 下图所示的非确定有限自动机 (S0为初态,S3为终态)可识别字符串( )。 A. bbaaB.aab 某软件项目的活动图如下图所示,其中顶点表示项目里程碑,连接顶点的边表示包含的活动,边上的数字表示活动的持续天数,则完成该项目的最少时间为( )天。活动EH和IJ的松弛时间分别为(请作答此空)天。 采用白盒测试方法对下图进行测试,设计了4个测试用例:①(x=0,y=3),②(x=1,y=2),③(x=-1,y=2),④(x=3,y=1)。至少需要测试用例①②才能完成( )覆盖,至少需要测试用例 下图是一项布线工程计划和实际完成的示意图,2009年3月23日的PV、EV、AC分别是 : work( ),systems that effectively isolate an organization's internal network structure from an ( ) ne
221381
领取福利

微信扫码领取福利

微信扫码分享