Phishing is _______________________
Options - Criminally deceitful process of trying to acquire the sensitive information - A computer software which is installed on the system without the user's knowledge to track the user's interaction with the system - A technique commonly used for Spam e-mails - A program that can copy itself and infect the a computer without the permission of the owner
CORRECT ANSWER : Criminally deceitful process of trying to acquire the sensitive information
|