Which of the following is NOT a common method used to gain unauthorized access to computer systems?
Phishing
Social engineering
Negotiation
Malware

Cybercrime Exercises are loading ...