1.

_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.(a) Data copying(b) Data masking(c) Data breaching(d) Data duplicatingThe question was posed to me by my college professor while I was bunking the class.Question is taken from Hacking Terminologies in chapter Cyber Security of Cyber Security

Answer»

Right choice is (B) Data masking

To elaborate: Data masking is the method used for developing or CREATING a structurally similar VERSION of data of any organization that is not authentic. These TYPES of unauthentic data are purposefully created for protecting the actual data.



Discussion

No Comment Found

Related InterviewSolutions