Q. Hackers often gain entry to a network be pretending to be at a legitimate computer. (Solved)
1. Spoofing
2. forging
3. IP spoofing
4. ID theft
5. None of these
- c. IP spoofing
1. Spoofing
2. forging
3. IP spoofing
4. ID theft
5. None of these