C-04-Q063mediumsingle_mcqThe process of theft during data exchange is called:aEncryptionbData interceptioncRoutingdPinging