Que: Which of these is not a step followed by cyber-criminals in data breaching? a. Research and info-gathering b. Attack the system c. Fixing the bugs d. Exfiltration Answer: Fixing the bugs