An attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication is termed as:

  • Spooling
  • Tracking
  • Bugging
  • Phishing
 An attempt to criminally and fraudulently acquire sensitive information, such as usernames, pa
Home Ask Questions Study Current Affairs Previous Papers Kerala PSCIBPSUPSCRBITNPSCMPSCSSCCBSEUnited StatesModel Tests News More Answers Coaching Centres Careers Downloads Colleges