_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.
(a) Data copying
(b) Data masking
(c) Data breaching
(d) Data duplicating
The question was posed to me by my college professor while I was bunking the class.
Question is taken from Hacking Terminologies in chapter Cyber Security of Cyber Security