Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.

a) Data copying
b) Data masking
c) Data breaching
d) Data duplicating

Answer: b
Explanation: Data masking is the method used for developing or creating a structurally similar version of data of any organization that is not authentic. These types of unauthentic data are purposefully created for protecting the actual data.

Join The Discussion