A Security technician would like that to obscure sensitive data within a file so that can be transferred
without causing suspicion. Which of the following technologies would BEST be suited to accomplish this?

A.
Transport Encryption
B.
Stream Encryption
C.
Digital Signature
D.
Steganography