What is spoofing in the context of e-governance security?
AOverwhelming a server with requests to make it crash.
BDenying a transaction after it has occurred.
CImpersonating a legitimate user or using a false IP address for unauthorized access.
DModifying or altering confidential information after compromising a system.