Answer:
D. Phishing
Step-by-step explanation:
Answer: B. Packet sniffing
right on edge
4.7m questions
6.2m answers