1.

___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.

A. Data-hack
B. Data-stealing
C. Database altering
D. Data breach
Answer» E.


Discussion

No Comment Found