Que: In _______________ attack, the attacker doesn’t actively take over another user to perform the attack. a. phishing b. spoofing c. hijacking d. vishing Answer: spoofing