Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?

Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?

Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?

A.
Spoofing

B.
Man-in-the-middle

C.
Spear phishing

D.
DoS



Leave a Reply 0

Your email address will not be published. Required fields are marked *