#1. Unsolicited commercial email is known as ____ .
#2. Which virus spreads in application software?
#3. Unauthorized access in a network ____ issue.
#4. Digilocker is _____.
#5. What happens to your data is when it is encrypted?
#6. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as _______.
#7. ___ is a branch of information technology known as information security.
#8. If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of ____.