Watch this video on YouTube
Which data mitigation technique involves disguising or altering sensitive data to protect confidentiality during testing?