PdfPrep.com

Which of the following methods was used to encode the data?

A security analyst is investigating a security breach involving the loss of sensitive data. A user passed the information through social media as vacation photos.

Which of the following methods was used to encode the data?
A . Obfuscation
B . Steganography
C . Hashing
D . Elliptic curve

Answer: B

Exit mobile version