Q.

This is an assault on the integrity of a security system in which the attacker substitutes a section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed.

A. Trojan horse
B. Hashing
C. Switching fabric
D. Cut and paste attack
Answer» D. Cut and paste attack
1.9k
0
Do you find this helpful?
1

View all MCQs in

Information Security

Discussion

No comments yet