Unauthorized attempts to bypass the security mechanisms of an information system or a network is called :ASpoofingBBlockingCHackingDResistingAnswer: C. Hacking