______________ is the unauthorized movement of data.
(a) Data exfiltration
(b) Data infiltration
(c) Data cracking
(d) Database hacking
I got this question during an interview for a job.
My question is taken from Security Phases in portion Phases of Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,