A system administrator wants to confidentially send a user name and password list to an individual outside the
company without the information being detected by security controls. Which of the following would BEST meetthis security goal?
A.
Digital signatures
B.
Hashing
C.
Full-disk encryption
D.
Steganography
Explanation:
Steganography is the process of concealing a file, message, image, or video within another file, message,
image, or video.
Note: The advantage of steganography over cryptography alone is that the intended secret message does not
attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how
unbreakable will arouse interest, and may in themselves be incriminating in countries where encryption is
illegal. Thus, whereas cryptography is the practice of protecting the contents of a message alone,
steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing
the contents of the message.