Q. Act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity is called
A. email bombing
B. Spamming
C. Cyber stalking
D. Phishing
Answer: Phishing
A. email bombing
B. Spamming
C. Cyber stalking
D. Phishing
Answer: Phishing