sarahabuadas1336 sarahabuadas1336 22-06-2017 Computers and Technology contestada A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.