________ occurs when a person breaks into computers, servers, or networks to steal data

A) Phishing
B) Pretexting
C) Digital footprinting
D) Hacking

D

Business

You might also like to view...

The 2011 "Arab Spring" in the Middle East was facilitated in large part by social media

Indicate whether the statement is true or false

Business

A want is the particular form of consumption used to restore homeostasis

Indicate whether the statement is true or false

Business