Que: In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.

a. phishing
b. spoofing
c. hijacking
d. vishing
Answer: spoofing

Leave a Comment