User Forum

Subject :NCO    Class : Class 5

Obtaining unauthorized access to other systems in a network is called _____.
A Access
B Stealing
C Forging
D Hacking


Ethical hacking is - Chori , Chori , Chupke , Chupke .

Post Your Answer