In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.
(a) phishing
(b) spoofing
(c) hijacking
(d) vishing
I have been asked this question in unit test.
My question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security