A company is implementing a tool to mask all PII when moving data from a production server to a testing server.
Which of the following security techniques is the company applying?
A . Data wiping
B . Steganograpgy
C . Data obfuscation
D . Data sanitization
Answer: D