Joe, a user, wants to protect sensitive information stored on his hard drive. He uses a program that encrypted
the whole hard drive. Once the hard drive is fully encrypted, he uses the same program to create a hiddenvolume within the encrypted hard drive and stores the sensitive information within the hidden volume.
Which of the following is this an example of? (Choose two.)
Steganography is the process of concealing a file, message, image, or video within another file, message,
image, or video. In this case, it is a hidden volume within the encrypted hard drive.
In cryptography, deniable encryption may be used to describe steganographic techniques, where the very
existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that an
encrypted message exists. This then provides you with plausible deniability.