Collecting personal information and effectively posing as another individual is known as the crime of_____AspoolingBidentity theftCspoofingDhackingAnswer: B. identity theft