Which type of attack occurs when a hacker obtains passwords and other information from legitimate transactions?
Which of the following best describes the problem with share permissions and share points in Windows NT/2000?