What best describes the security threat of spoofing?
- sending bulk email to individuals, lists, or domains with the intention to prevent users from accessing email
- intercepting traffic between two hosts or inserting false information into traffic between two hosts
- making data appear to come from a source that is not the actual source
- sending abnormally large amounts of data to a remote server to prevent user access to the server services
Explanation & Hint:
The security threat of spoofing is best described by: Making data appear to come from a source that is not the actual source. Spoofing is a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server. |