1) What is called the unauthorized control/acess over the computer system and destroys the data?
Correct Answer: Hacking
2) Which method go through all the files or network elements with an intention to detect something unusual?
Correct Answer: Scanning