Which of the following describes the phishing method of information security cri

Computer Science
Tutor: None Selected Time limit: 1 Day

security crime

physically interacting with the victim and using her computer when she is not looking

rifling throught recycling bins to find account information

pretending to be someone else when asking information

all of these

Mar 11th, 2015

pretending to be someone else when asking information

Mar 11th, 2015

Studypool's Notebank makes it easy to buy and sell old notes, study guides, reviews, etc.
Click to visit
The Notebank
...
Mar 11th, 2015
...
Mar 11th, 2015
Mar 25th, 2017
check_circle
Mark as Final Answer
check_circle
Unmark as Final Answer
check_circle
Final Answer

Secure Information

Content will be erased after question is completed.

check_circle
Final Answer