Multiple Choice
Modification of Data is done in:
A) both active and passive attacks
B) neither active and passive attacks
C) active attacks
D) passive attacks
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q8: The full form of OSI is OSI
Q9: _Policy ensures that the organization is maintaining
Q10: Compromising confidential information comes under _ <br>A)bug<br>B)threat<br>C)vulnerability<br>D)attack
Q11: When original data is changed to make
Q12: Which of the following are not security
Q14: A process of making the encrypted text
Q15: ATM pin while withdrawing money is an
Q16: Study of creating a d using encryption
Q17: If communication between 2 people is overheard
Q18: If communication between 2 people is overheard