Sometimes __________________ anonymize them to perform criminal activities.
(a) virus
(b) incident handlers
(c) cyber-criminals
(d) ethical hackers
I have been asked this question in examination.
My question comes from Cyber Security Privacy in section Privacy in Cyber Security & Deep Web of Cyber Security