Q. This is an assault on the integrity of a security system in which the attacker substitutesa section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed. (Solved)

1. Trojan horse

2. Hashing

3. Switching fabric

4. Cut and paste attack

  • d. Cut and paste attack
Subscribe Now

Get All Updates & News