CompTIA A+ Core 2 Question C-58

Which of the following BEST describes the practice of attempting to gain information through deceptive emails?

A. Hashing
B. Biometrics
C. Phishing
D. Encryption

Correct Answer: C