Cyber Security Set 3


What is called the unauthorized control/acess over the computer system and destroys the data?
  
    (A) Defamation
    (B) Carding
    (C) Hacking
    (D) Cyber - stalking

Hacking

Which method go through all the files or network elements with an intention to detect something unusual?
  
    (A) Probing
    (B) Phishing
    (C) Infecting
    (D) Scanning

Scanning