Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
A.
Spoofing
B.
Man-in-the-middle
C.
Spear phishing
D.
DoS
Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
A.
Spoofing
B.
Man-in-the-middle
C.
Spear phishing
D.
DoS