_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.
(a) Data copying
(b) Data masking
(c) Data breaching
(d) Data duplicating
The question was posed to me by my college professor while I was bunking the class.
Question is taken from Hacking Terminologies in chapter Cyber Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,