What tactic do hackers use to gather data from systems, which can include sensitive information?
(Select The Best Answer)
Encryption
Collection
Firewall
Phishing