Q. This is an assault on the integrity of a security system in which the attacker substitutesa section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed. (Solved)
1. Trojan horse
2. Hashing
3. Switching fabric
4. Cut and paste attack
- d. Cut and paste attack