Question No 3:
A security technician would like to obscure sensitive data within a file so that it can be transferred without
causing suspicion. Which of the following technologies would BEST be suited to accomplish this?
A. Transport Encryption
B. Stream Encryption
C. Digital Signature
D. Steganography
Correct Answer: D
No comments:
Post a Comment
Note: only a member of this blog may post a comment.