Before data is sent out for analysis, what technique can be used to replace sensitive data in non-production environments to protect the underlying information?
- Steganalysis
- Data masking substitution
- Software obfuscation
- Steganography
Explanation: Technologies exist to confuse attackers by changing data and using techniques to hide the original data.
Exam with this question: Cybersecurity Essentials: Course Final Exam Answers
Please login or Register to submit your answer