Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS
listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE)
messages on these addresses. Which of the following e-mail crimes is Peter committing?
A.
E-mail Spam
B.
E-mail spoofing
C.
E-mail bombing
D.
E-mail Storm
Explanation: