Which of the following BEST describes the practice of attempting to gain information through deceptive emails?
A. Hashing
B. Biometrics
C. Phishing
D. Encryption
CompTIA exam questions
Which of the following BEST describes the practice of attempting to gain information through deceptive emails?
A. Hashing
B. Biometrics
C. Phishing
D. Encryption