Something like a hard drive.
Answer:
please give me brainlist and follow
Explanation:
There are various phishing techniques used by attackers:
Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.
The tab that you would use is review
The "ipconfig" command in windows will show the configuration of all attached network interfaces.
Just so you know this isn't how this works. You have to give people a question and answers to choose from.