Unauthorized host pretends to be authorized host by meeting some authorization criterion

In which type of vulnerability an unauthorized host pretends to be authorized host by meeting some authorization criterion?
(a) spoofing
(b) keystroke logger
(c) phishing
(d) tunnel

Anurag Mishra Professor Asked on 20th March 2016 in Sports.
Add Comment
1 Answer(s)

spoofing

pankajpathak1843 Default Answered on 20th March 2016.
Add Comment

Your Answer

By posting your answer, you agree to the privacy policy and terms of service.