rodrigo8264 rodrigo8264 06-04-2024 Computers and Technology contestada Which among the following is an active attack?(1)Accessing restricted data(2)User Impersonation(3)Eavesdropping on network traffic(4)Release of message content