Which type of attack is most likely to occur in this situation?

An e-mail client on an end user’s desktop has just logged on to a remote server using POP3. The
login was not encrypted. Which type of attack is most likely to occur in this situation?

An e-mail client on an end user’s desktop has just logged on to a remote server using POP3. The
login was not encrypted. Which type of attack is most likely to occur in this situation?

A.
Hijacking

B.
Spoofing

C.
Phreaking

D.
Social engineering

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *