What is it called when an attacker makes data to look like it’s coming from a legitimate source?
A.
hacking
B.
spoofing
C.
hijacking
D.
multithreading
What is it called when an attacker makes data to look like it’s coming from a legitimate source?
What is it called when an attacker makes data to look like it’s coming from a legitimate source?
A.
hacking
B.
spoofing
C.
hijacking
D.
multithreading