Subject :NCO Class : Class 5
Obtaining unauthorized access to other systems in a network is called _____.
A Access
B Stealing
C Forging
D Hacking
Ethical hacking is - Chori , Chori , Chupke , Chupke .