InterviewSolution
Saved Bookmarks
| 1. |
_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.(a) Data copying(b) Data masking(c) Data breaching(d) Data duplicatingThe question was posed to me by my college professor while I was bunking the class.Question is taken from Hacking Terminologies in chapter Cyber Security of Cyber Security |
|
Answer» Right choice is (B) Data masking |
|