Q.

Download copy, extract data from an open system done fraudulently is treated as _________

A. cyber-warfare
B. cyber-security act
C. data-backup
D. cyber-crime
Answer» D. cyber-crime
924
0
Do you find this helpful?
11

Discussion

No comments yet