LIST I | LIST II |
---|---|
A. Doxing operations | IV. Cyber bullying |
B. FOSS | III. It grants a user substantial rights and freedom |
C. WORM | II. It is a program which copies itself across a network |
D. TROJAN HORSE | I. It is a program which is intended to carry out malicious operations |
LIST I | LIST II |
---|---|
A. Slammer | IV. Virus |
B. Microwave | II. Uni directional |
C. Radio wave | I. Omni directional |
D. White hats | III. Ethical hacker |