

MCQOPTIONS
Saved Bookmarks
1. |
This is an assault on the integrity of a security system in which the attacker substitutesa section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed. |
A. | Trojan horse |
B. | Hashing |
C. | Switching fabric |
D. | Cut and paste attack |
Answer» E. | |