Unauthorized host pretends to be authorized host by meeting some authorization criterion

In which type of vulnerability an unauthorized host pretends to be authorized host by meeting some authorization criterion?
(a) spoofing
(b) keystroke logger
(c) phishing
(d) tunnel

Anurag Mishra Professor Asked on 20th March 2016 in Sports.
Add Comment
  • 1 Answer(s)

    spoofing

    pankajpathak1843 Default Answered on 20th March 2016.
    Add Comment
  • Your Answer

    By posting your answer, you agree to the privacy policy and terms of service.