Q.  Collecting personal information and effectively posing as another individual is known as the crime of....

Question ID: 1129
  1. hacking
  2. spooling
  3. dentity theft
  4. spoofing


❮ Prev       Next ❯