Which of the following BEST describes the practice of attempting to gain information through
deceptive emails?
A.
Hashing
B.
Biometrics
C.
Phishing
D.
Encryption
Which of the following BEST describes the practice of attempting to gain information through
deceptive emails?
Which of the following BEST describes the practice of attempting to gain information through
deceptive emails?
A.
Hashing
B.
Biometrics
C.
Phishing
D.
Encryption
this is too easy