Which of the following attacks does this describe?
A malicious actor compromises a legitimate website, configuring it to deliver malware to visitors of the website. Which of the following attacks does this describe?A . WhalingB . Watering holeC . ImpersonationD . SpoofingView AnswerAnswer: A