Which of the following BEST describes the practice of attempting to gain information through deceptive emails?

Which of the following BEST describes the practice of attempting to gain information through
deceptive emails?

Which of the following BEST describes the practice of attempting to gain information through
deceptive emails?

A.
Hashing

B.
Biometrics

C.
Phishing

D.
Encryption



Leave a Reply 1

Your email address will not be published. Required fields are marked *


hmm

hmm

this is too easy