injntu.com injntu.com injntu bits/digi… · q)steganography is used for which of the following...

6
INJNTU.COM INJNTU.COM INJNTU.COM INJNTU.COM

Upload: others

Post on 16-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INJNTU.COM INJNTU.COM INJNTU Bits/Digi… · Q)Steganography is used for which of the following purposes?--> Hiding data Q)A computer or network set up to lure an attacker is.-->

INJNTU.COM

INJNTU.COM INJNTU.COMINJNTU.COM

Page 2: INJNTU.COM INJNTU.COM INJNTU Bits/Digi… · Q)Steganography is used for which of the following purposes?--> Hiding data Q)A computer or network set up to lure an attacker is.-->

INJNTU.COM

INJNTU.COM INJNTU.COMINJNTU.COM

Page 3: INJNTU.COM INJNTU.COM INJNTU Bits/Digi… · Q)Steganography is used for which of the following purposes?--> Hiding data Q)A computer or network set up to lure an attacker is.-->

INJNTU.COM

INJNTU.COM INJNTU.COMINJNTU.COM

Page 4: INJNTU.COM INJNTU.COM INJNTU Bits/Digi… · Q)Steganography is used for which of the following purposes?--> Hiding data Q)A computer or network set up to lure an attacker is.-->

INJNTU.COM

INJNTU.COM INJNTU.COMINJNTU.COM

Page 5: INJNTU.COM INJNTU.COM INJNTU Bits/Digi… · Q)Steganography is used for which of the following purposes?--> Hiding data Q)A computer or network set up to lure an attacker is.-->

INJNTU.COM

INJNTU.COM INJNTU.COMINJNTU.COM

Page 6: INJNTU.COM INJNTU.COM INJNTU Bits/Digi… · Q)Steganography is used for which of the following purposes?--> Hiding data Q)A computer or network set up to lure an attacker is.-->

INJNTU.COM

INJNTU.COM INJNTU.COMINJNTU.COM