abaker2054 abaker2054 15-05-2023 Engineering contestada which of the following is commonly used by computer criminals to exploit human weaknesses by misrepresenting oneself to trick others into revealing information?