tonyfoncho22 tonyfoncho22 Today at 7:33 PM Computers and Technology Answered Which of the following would a cyber criminal most likely do once they gained access to a user id and password