Que: Download copy, extract data from an open system done fraudulently is treated as _________

a. cyber-warfare
b. cyber-security act
c. data-backup
d. cyber-crime
Answer: cyber-crime

Leave a Comment