Answer:
Attackers commonly impersonate trusted entities by creating fake websites or emails that mimic the appearance of legitimate ones.
Attackers commonly impersonate trusted entities by creating fake websites or emails that mimic the appearance of legitimate ones.
You may be interested in:
Web Security MCQs - PART 2