Q. The flooding of the victim’s computer with _________ affects the bandwidth of the system and the user is unable to access and work on the computer. (Solved)
1. Hacking
2. Spam
3. Phishing
4. Spoofing
- b. Spam
1. Hacking
2. Spam
3. Phishing
4. Spoofing