Mike, a user, receives an email from his grandmother stating that she is in another country and
needs money. The email address belongs to his grandmother. Which of the following attacks is
this?
A.
Man-in-the-middle
B.
Spoofing
C.
Relaying
D.
Pharming