SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

ISDS 705 Chapter 13

» Start this Course
(Practice similar questions for free)
Question:

Phishing:

Author: CD Stucki



Answer:

Cons executed technology in order to: acquire sensitive information, trick someone into installing malicious software


0 / 5  (0 ratings)

1 answer(s) in total

Author

CD Stucki
CD Stucki