A system administrator wants to confidentially send a user name and password list to an individual
outside the company without the information being detected by security controls. Which of the
following would BEST meet this security goal?
A.
Digital signatures
B.
Hashing
C.
Full-disk encryption
D.
Steganography