Making data appear to come from somewhere other than the originating point is known as
A.
hacking.
B.
spoofing.
C.
cracking.
D.
social engineering.
Making data appear to come from somewhere other than the originating point is known as
Making data appear to come from somewhere other than the originating point is known as
A.
hacking.
B.
spoofing.
C.
cracking.
D.
social engineering.