Answer:
please give me brainlist and follow
Explanation:
There are various phishing techniques used by attackers:
Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information
I Think The answer is c I hope it helps Message Me if I’m wrong and I’ll change My answer and fix it for you
I can't even say this is an answer
If there isn't a specific answer for this, I think it depends on everyone. Maybe they'd behave better knowing that their actions are being monitored. Who in their right mind is going to act like a lunatic when they know people are watching.
I think it will most likely alter their attitude in a positive way but it will also most likely be fake actions put on show