MCQOPTIONS
Saved Bookmarks
| 1. |
This is an assault on the integrity of a security system in which the attacker substitutes a section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed. |
| A. | Trojan horse |
| B. | Hashing |
| C. | Switching fabric |
| D. | Cut and paste attack |
| Answer» E. | |