A technique used to redirect a legitimate website's traffic to another illegitimate website in order to gain access to a user's personal information is known as _______.
APhishing
BPharming
CSpamming
DClickjacking
A technique used to redirect a legitimate website's traffic to another illegitimate website in order to gain access to a user's personal information is known as _______.
APhishing
BPharming
CSpamming
DClickjacking