What attack involves actions to mimic one’s identity?

A.
Brute force
B.
Exhaustive
C.
Social engineering
D.
Spoofing
Explanation:
Spoofing is an attack in which one person or process pretends to be a person or process
that has more privileges. For example, user A can mimic behavior to make process B
believe user A is user C. In the absence of any other controls, B may be duped into
giving to user A the data and privileges that were intended for user C.
check
0
0