The cracker will use a program or script known as a __________
The cracker will use a program or script known as a __________
(A) Cracking
(B) Crack
(C) Cyberstalking
(D) Phishing
5 views