App Logo

No.1 PSC Learning App

1M+ Downloads
Unauthorized attempts to bypass the security mechanisms of an information system or a network is called :

ASpoofing

BBlocking

CHacking

DResisting

Answer:

C. Hacking


Related Questions:

A cyberattack intended to redirect a website traffic to another, fake site by installing a malicious program on the computer is called?
Copying the materials published on the internet as one’s own without proper acknowledgement is called _____:
താഴെ തന്നിരിക്കുന്നവയിൽ ഏതാണ് ഒരു വൈറസ്?
A “program that is loaded onto your computer without your knowledge and runs against your wishes
ആദ്യ കമ്പ്യൂട്ടർ വേം ഏതാണ് ?