One common tactic to conceal e-mail traffic involves_________.
A. a shared account and a “drafts” folder
B. text reader and translator
C. private browsing and autofill
Solution
A. a shared account and a “drafts” folder
An suer
One common tactic to conceal e-mail traffic involves_________.
A. a shared account and a “drafts” folder
B. text reader and translator
C. private browsing and autofill
Solution
A. a shared account and a “drafts” folder
An suer