Q. This kind of attack involves altering raw data just before a computer processes it and thenchanging it back after the processing is completed. (Solved)
1. data diddling
2. salami attacks
3. virus attack
4. none of the above
- a. data diddling
1. data diddling
2. salami attacks
3. virus attack
4. none of the above