Phishers often develop ______________ websites for tricking users & filling their personal data.
(a) legitimate
(b) illegitimate
(c) genuine
(d) official
I got this question in an interview.
My question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security