Attack in which a user creates a packet that appears to be something else.
(a) Smurfing
(b) Trojan
(c) E-mail bombing
(d) Spoofing
I have been asked this question during an online interview.
Question is from Encryption and Viruses in chapter Information Technology of Computer Fundamentals