Answer:
Spoofing
Step-by-step explanation:
Spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source
1.6m questions
2.0m answers