Obfuscation Techniques for Secure Data Transfer | CompTIA SY0-601 Exam Answer

Obfuscation Techniques for Secure Data Transfer

Prev Question Next Question

Question

A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion.

Which of the following technologies would BEST be suited to accomplish this?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

Steganography is the process of hiding a message in another message so as to obfuscate its importance.

It is also the process of hiding a message in a medium such as a digital image, audio file, or other file.

In theory, doing this prevents analysts from detecting the real message.

You could encode your message in another file or message and use that file to hide your message.

The technology that would BEST be suited to obscure sensitive data within a file so that it can be transferred without causing suspicion is Steganography.

Steganography is the practice of hiding information within other information in such a way that it is not apparent to an observer. It is often used to conceal the existence of sensitive data or to protect it from unauthorized access. The key difference between steganography and encryption is that encryption makes data unreadable, while steganography hides the data.

Transport encryption (A) and stream encryption (B) are encryption technologies used to protect data in transit, but they do not hide the existence of the data. These technologies work by encoding the data in a way that only authorized parties with the correct key can read it.

Digital signatures (C) are used to ensure the integrity and authenticity of data. A digital signature is a mathematical technique used to verify the authenticity and integrity of a digital document or message. It does not obscure the data but rather provides a means of verifying that the data has not been tampered with.

In summary, steganography is the best technology to obscure sensitive data within a file so that it can be transferred without causing suspicion because it conceals the existence of the data rather than encrypting it.