What best describes the security threat of spoofing?
- sending bulk email to individuals, lists, or domains with the intention to prevent users from accessing email
- intercepting traffic between two hosts or inserting false information into traffic between two hosts
- making data appear to come from a source that is not the actual source
- sending abnormally large amounts of data to a remote server to prevent user access to the server services