Which of the following technologies would BEST be suited to accomplish this?

A security technician would like to obscure sensitive data within a file so that it can be transferred
without causing suspicion. Which of the following technologies would BEST be suited to
accomplish this?

A security technician would like to obscure sensitive data within a file so that it can be transferred
without causing suspicion. Which of the following technologies would BEST be suited to
accomplish this?

A.
Transport Encryption

B.
Stream Encryption

C.
Digital Signature

D.
Steganography



Leave a Reply 0

Your email address will not be published. Required fields are marked *

12 + 9 =