CompTIA Exam Questions

What is it called when an attacker makes data to look like it’s coming from a legitimate sourc

What is it called when an attacker makes data to look like it’s coming from a legitimate source?

A.
hacking

B.
spoofing

C.
hijacking

D.
multithreading