A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion.Which of the following technologies would BEST be suited to accomplish this?

A. Transport Encryption
B. Stream Encryption
C. Digital Signature
D. Steganography

Answer: D. Steganography

Computer Science & Information Technology

You might also like to view...

To have a hyperlink link to a specific location in the presentation, click the ________

A) Edit Hyperlink option B) New Location link C) Go To button D) Bookmark button

Computer Science & Information Technology

. Write a shell function called octal that converts octal numbers given as command-line arguments to decimal numbers and prints them out, one per line

$ octal 10 11 12 8 9 10 (Korn shell users, remember that if you assign a decimal number to a variable when it's declared – for example, typeset –i d=10#0 – assignments to this variable from other bases are automatically converted to decimal.)

Computer Science & Information Technology