S
Q. attack is when original data is modified and malicious data is inserted
- Correct Answer - Option(B)
- Views: 988
- Filed under category Information Cyber Security
No solution found for this question.
Add Solution and get +2 points.
You must be Logged in to update hint/solution
Be the first to start discuss.
Related Posts
Q. Which one of the following algorithm is not used in asymmetric-key cryptography?
Q. When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:
Q. From the options below, which of them is not a threat to information security?
Q. When original data is changed to make it non-meaningful by attacker it is known as
Q. Sending offensive message to someone comes under _____________ of the Indian IT Act ______
Q. Which of the following is a disadvantage of Circuit-level gateway firewalls?
Q. Assurance that authentic user is taking part in communication is:
View All Posts
Question analytics

Discusssion
Login to discuss.