1.

This is an assault on the integrity of a security system in which the attacker substitutesa section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed.

A. Trojan horse
B. Hashing
C. Switching fabric
D. Cut and paste attack
Answer» E.


Discussion

No Comment Found