This technique hides the message in a carrier medium visible to everyone.

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

This technique hides the message in a carrier medium visible to everyone.

Explanation:
Hiding a message in plain sight by using a carrier that everyone can see is the hallmark of a null cipher. In this approach, the real content is embedded within ordinary text or another common medium, and the secret only appears when you apply a prearranged rule to extract it—such as taking every nth letter, using the initial letters of words or sentences, or spotting a specific pattern in spacing or punctuation. To the casual reader, the carrier looks normal, but someone who knows the rule can pull out the hidden message. This fits best because the concealment relies on the method of extraction from an openly visible carrier text, rather than on encrypting the content or hiding it inside a file like an image. Semagrams and covered ciphers aren’t standard terms for this scenario, and image steganography, while also hiding data, uses a different kind of carrier and approach.

Hiding a message in plain sight by using a carrier that everyone can see is the hallmark of a null cipher. In this approach, the real content is embedded within ordinary text or another common medium, and the secret only appears when you apply a prearranged rule to extract it—such as taking every nth letter, using the initial letters of words or sentences, or spotting a specific pattern in spacing or punctuation. To the casual reader, the carrier looks normal, but someone who knows the rule can pull out the hidden message. This fits best because the concealment relies on the method of extraction from an openly visible carrier text, rather than on encrypting the content or hiding it inside a file like an image. Semagrams and covered ciphers aren’t standard terms for this scenario, and image steganography, while also hiding data, uses a different kind of carrier and approach.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy