Answer:
D. Phishing
Step-by-step explanation:
Answer: B. Packet sniffing
right on edge
6.6m questions
8.7m answers