An e-mail client on an end user’s desktop has just logged on to a remote server using POP3. The
login was not encrypted. Which type of attack is most likely to occur in this situation?
A.
Hijacking
B.
Spoofing
C.
Phreaking
D.
Social engineering
Explanation: