Download copy, extract data from an open system done fraudulently is treated as _________
(a) cyber-warfare
(b) cyber-security act
(c) data-backup
(d) cyber-crime
The question was posed to me in final exam.
The above asked question is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,