Subscribe TechModgy to learn about new technologies!

The _____________ are based on modification of the original message in some manner, or on creation of a false message.

A. Passive attack

B. Release of message content attack

C. Traffic analysis attack

D. Active attack

Please do not use chat terms. Example: avoid using "grt" instead of "great".