1.

_____________________ is unauthorized use, access, modification, and destruction of hardware, software, data, or network resources

A. acking
B. omputer Crime
C. poofing
D. niffer
Answer» C. poofing


Discussion

No Comment Found