Which of the following methods was used to encode the data?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

A security analyst is investigating a security breach involving the loss of sensitive data. A user passed the information through social media as vacation photos.

Which of the following methods was used to encode the data?
A . Obfuscation
B . Steganography
C . Hashing
D . Elliptic curve

Answer: B

Leave a Reply

Your email address will not be published.