85.
Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user's system?

86.
Which of the following have emphasis in India's nuclear deterrent?

87.
Which of the following is not a characteristic feature of non-alignment?