__________ is a technique of extracting confidential information such as credit card numbers and username password combos by pretending as a legal enterprise.
Column ‘A’
Column ‘B’
(1) Phishing
(A) Technique of extracting
confidential information
2) Plagiarism
(B)Presenting someone else’s
work or idea as your own without
their consent
(3) Hacking
(D) Refers to unauthorized intrusion
into a computer or a network
(4) Cyber
(C) Safe...