What is an impersonation attack that takes advantage of a trusted relationship between two systems?

  • man-in-the-middle
  • sniffing
  • spamming
  • spoofing
Для просмотра статистики ответов нужно войти.