CompTIA Exam Questions

Which of the following BEST describes the practice of attempting to gain information through decepti

Which of the following BEST describes the practice of attempting to gain information through
deceptive emails?

A.
Hashing

B.
Biometrics

C.
Phishing

D.
Encryption