Cyber Security Set 3

What is called the unauthorized control/acess over the computer system and destroys the data?
(A) Defamation
(B) Carding
(C) Hacking
(D) Cyber - stalking
Hacking
Which method go through all the files or network elements with an intention to detect something unusual?
(A) Probing
(B) Phishing
(C) Infecting
(D) Scanning
Scanning