A.) Data replication B.) Data retention C.) Data masking D.) Data encryption Which of the following process replaces vulnerable or sensitive data with fictitious functional data that seems real, allowing the fictitious data to be used safely in operations where the original data are not required? Data replication Data retention Data masking Data encryption.