V
Q. means when an attacker pretends to be authentic user
Correct Answer - Option(A)
Share
Be the first to start discuss.
Related Posts
Q. Pretty good privacy (PGP) security system uses
Q. Cyber-crime can be categorized into ________ types.
Q. One commonly used public-key cryptography method is the ______ algorithm.
Q. 1. VPN is abbreviated as __________
Q. Release of message contents and Traffic analysis are two types of _________ attacks.
Q. Which of the following Algorithms not belong to symmetric encryption
Discusssion
Login to discuss.