in Education by
_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company. (a) Data copying (b) Data masking (c) Data breaching (d) Data duplicating The question was posed to me by my college professor while I was bunking the class. Question is taken from Hacking Terminologies in chapter Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right choice is (b) Data masking To elaborate: Data masking is the method used for developing or creating a structurally similar version of data of any organization that is not authentic. These types of unauthentic data are purposefully created for protecting the actual data.

Related questions

0 votes
    _________ are those individuals who maintain and handles IT security in any firm or organization. (a) IT Security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Attackers could steal ___________ to achieve illegitimate accessing to online accounts & disturbs the personal ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
0 votes
    An ethical hacker must ensure that proprietary information of the firm does not get leaked. (a) True (b) False ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    An attacker, who is an employee of your firm may ___________ to know your system password. (a) do peeping (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
0 votes
    Competitive information gathering if done in the form of active attack using malware or by other illicit means can put ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
...