Which of the following attacks is this?

Mike, a user, receives an email from his grandmother stating that she is in another country and needs money. The email address belongs to his grandmother. Which of the following attacks is this?

Mike, a user, receives an email from his grandmother stating that she is in another country and needs money. The email address belongs to his grandmother. Which of the following attacks is this?

A.
Man-in-the-middle

B.
Spoofing

C.
Relaying

D.
Pharming



Leave a Reply 0

Your email address will not be published. Required fields are marked *