Answer:
The correct option is: B. Spoofing
Step-by-step explanation:
In network security, a spoofing attack is defined as a technique by which an individual or a program impersonates as another by deliberately falsifying information or data to spread malware, steal information, or bypass access controls. The common types of spoofing are email spoofing, IP spoofing, DNS spoofing.
E-mail address spoofing is used by the hackers or spammers to hide the source or origin of the e-mails and is known as email spoofing. It involves creation of an email with a forged sender address.