

MCQOPTIONS
Saved Bookmarks
1. |
___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information. |
A. | Data-hack |
B. | Data-stealing |
C. | Database altering |
D. | Data breach |
Answer» E. | |