95.4k views
5 votes
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender:_____.

A. Malicious code.
B. Hoaxes.
C. Spoofing.
D. Sniffer.

User Stu Cox
by
7.8k points

1 Answer

4 votes

Answer:

C. Spoofing.

Step-by-step explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

User Tomer Gabel
by
8.4k points