Home » Computer » Computer Security » Question
  1. Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication ?
    1. Spoofing
    2. Phishing
    3. Stalking
    4. Hacking
    5. None of these
Correct Option: B

NA



Your comments will be displayed only after manual approval.