A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion.Which of the following technologies would BEST be suited to accomplish this?
A. Transport Encryption
B. Stream Encryption
C. Digital Signature
D. Steganography
Answer: D. Steganography
Computer Science & Information Technology
You might also like to view...
An Excel template has an .xlxb extension
Indicate whether the statement is true or false
Computer Science & Information Technology
List at least three criteria for selecting a typeface.
What will be an ideal response?
Computer Science & Information Technology
A firewall that is implemented as software on an individual PC or server is called a Host Firewall.
a. true b. false
Computer Science & Information Technology
A user discovers that color laser prints are printing slightly off-color. Which of the following should help restore the appropriate colors?
A. Use different paper B. Replace the fuser C. Replace the duplexer D. Calibrate the printer
Computer Science & Information Technology