medium
Single Answer
0What technique drives image-based threat vectors?
Answer Options
A
Encryption
B
Hashing
C
Forgery
D
Steganography
Correct Answer: D
Explanation
Images can have data, including malware or exfiltrated organizational information using a technique called steganography that embeds data into images without losing the integrity of the image. Encryption, hashing, and forgery are not the direct driver of image-based threat vectors, although encryption is likely to be used as an additional layer to protect data from more advanced threat actors wishing to conceal what they are hiding.