Q & A Q & A › Category: Ethical HackingFilter:AllOpenResolvedClosedUnansweredSort byViewsAnswersVotesThe telephone version of phishing that exploits social engineering techniques is known as __________.AnsweredAdmin asked 5 years ago • Ethical Hacking, Questions492 views1 answers-1 votesWhat is the common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer’s security?AnsweredAdmin asked 5 years ago • Ethical Hacking, Questions2144 views1 answers-1 votes