Before data is sent out for analysis, what technique can be used to replace sensitive data in non-production environments to protect the underlying information?
- Data masking substitution
- Software obfuscation
Explanation: Technologies exist to confuse attackers by changing data and using techniques to hide the original data.
More Questions: Cybersecurity Essentials: Course Final Exam Answers