S
Q. attack is when original data is modified and malicious data is inserted
Correct Answer - Option(B)
Share
Be the first to start discuss.
Related Posts
Q. Which layer of the OSI reference model does IPsec work at?
Q. length of the IPv4 address is ....
Q. __________ means knowledge obtained from investigation, study , intelligence new ,facts .
Q. What protocol is NOT used in the operation of a VPN?
Q. Which is the largest disadvantage of the symmetric Encryption?
Q. An attempt to make a computer resource unavailable to its intended users is called ______
Discusssion
Login to discuss.