A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion.Which of the following technologies would BEST be suited to accomplish this?

A. Transport Encryption
B. Stream Encryption
C. Digital Signature
D. Steganography


Answer: D. Steganography

Computer Science & Information Technology

You might also like to view...

An Excel template has an .xlxb extension

Indicate whether the statement is true or false

Computer Science & Information Technology

List at least three criteria for selecting a typeface.

What will be an ideal response?

Computer Science & Information Technology

A firewall that is implemented as software on an individual PC or server is called a Host Firewall.

a. true b. false

Computer Science & Information Technology

A user discovers that color laser prints are printing slightly off-color. Which of the following should help restore the appropriate colors?

A. Use different paper B. Replace the fuser C. Replace the duplexer D. Calibrate the printer

Computer Science & Information Technology