Tampering,; Repudiation,; Information disclosure,; Denial of service,; Elevation of privilege. The spoofing attack is impersonating someone else's identity.
確定! 回上一頁