Que: Download copy, extract data from an open system done fraudulently is treated as _________ a. cyber-warfare b. cyber-security act c. data-backup d. cyber-crime Answer: cyber-crime