Which of the following attacks is this?

Mike, a user, receives an email from his grandmother stating that she is in another country and
needs money. The email address belongs to his grandmother. Which of the following attacks is
this?

Mike, a user, receives an email from his grandmother stating that she is in another country and
needs money. The email address belongs to his grandmother. Which of the following attacks is
this?

A.
Man-in-the-middle

B.
Spoofing

C.
Relaying

D.
Pharming



Leave a Reply 0

Your email address will not be published. Required fields are marked *