_____ is unauthorized access to or use of data, systems, server or networks including
any
attempt to probe scan or test the vulnerability of a system, server or network or to breach
security or authentication measures without express authorization of the owner of the
system,
server or network:
a) Hacking
b) Cracking
c) Viruses
d) None of These
any
attempt to probe scan or test the vulnerability of a system, server or network or to breach
security or authentication measures without express authorization of the owner of the
system,
server or network:
a) Hacking
b) Cracking
c) Viruses
d) None of These