Joe, a user, wants to protect sensitive information stored on his hard drive. He uses a program
that encrypted the whole hard drive. Once the hard drive is fully encrypted, he uses the same
program to create a hidden volume within the encrypted hard drive and stores the sensitive
information within the hidden volume. This is an example of which of the following? (Select TWO).

A.
Multi-pass encryption
B.
Transport encryption
C.
Plausible deniability
D.
Steganography
E.
Transitive encryption
F.
Trust models