Tonyfoncho22go Tonyfoncho22go Computers and Technology Answered Which of the following would a cyber criminal most likely do once they gained access to a user id and password