lulu3782 lulu3782 13-12-2022 Computers and Technology contestada ......involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. group of answer choices pretexting spoofing hacking phishing