Question 202:
A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion. Which of the following technologies would BEST be suited to accomplish this?
Answer options:
A. Transport Encryption B. Stream Encryption C. Digital Signature D. Steganography