Home

An unauthorized party inserts counterfeit objects into the system is called_________________

A. interruption

B. interception

C. fabrication

D. modification

Please do not use chat terms. Example: avoid using "grt" instead of "great".