Saved Bookmarks
| 1. |
In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.(a) phishing(b) spoofing(c) hijacking(d) vishingI have been asked this question in unit test.My question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (b) spoofing |
|