What attack involves actions to mimic one’s identity?

What attack involves actions to mimic one’s identity?

What attack involves actions to mimic one’s identity?

A.
Brute force

B.
Exhaustive

C.
Social engineering

D.
Spoofing

Explanation:
Spoofing is an attack in which one person or process pretends to be a person or process
that has more privileges. For example, user A can mimic behavior to make process B
believe user A is user C. In the absence of any other controls, B may be duped into
giving to user A the data and privileges that were intended for user C.



Leave a Reply to Jamal Ahmed Cancel reply1

Your email address will not be published. Required fields are marked *

15 + eleven =


Jamal Ahmed

Jamal Ahmed

check