A technique used to gain personal information for the purpose of identity theft, often by
e‐mail, is called?
a. Phishing
b. Carding
c. Brand spoofing
d. All of the above
e‐mail, is called?
a. Phishing
b. Carding
c. Brand spoofing
d. All of the above