Answer:
The answer is "Option b".
Step-by-step explanation:
Phishing is used by hackers to get sensitive data. It is a software tool, that offers online mail to use we can track the users. It also known as a state, in which clients will have to re-enter id and pass codes to validate themselves due to some changes to the system, and incorrect option can be defined as follows:
- In option a, It is used to attack on user system.
- In option c, It is used to provides unauthorized access.
- In option d, It is also known as malware, which is installed in user smartphones.