Question

Using _____, an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected.
a. buffering
b. denial of service
c. worms
d. spoofing

Answer

This answer is hidden. It contains 1 characters.