What is the correct answer?


The _____________ are based on modification of the original message in some manner, or on creation of a false message.

A. Passive attack

B. Release of message content attack

C. Traffic analysis attack

D. Active attack

Correct Answer :

D. Active attack

Related Questions

A sequence of instructions telling the computer what to do is called a_____________ The ___ contains commands associated with the My Computer window A process is _________________ When copying more than one file at a time, you must specify an existing… Which is the layer of a computer system between the hardware and the user… _______________refers to a strategy where whenever a resource is requested,… Most accurate global time is based on oscillations of the ______________ The Basic Input Output System (BIOS) resides in All of the following are TRUE regarding virtual memory EXCEPT To install the new font Which one is true for unconditional disk formatting? ______________is a mechanism the prevents two or more processes from accessing… In case of modification an unauthorized party not only gains access to… The Bankers algorithm is used Ext2 is the standard file system of _______ and uses a block size of_____bytes Which of the following is not essential to shut down your computer? Underlined text, such as text and folder names is referred to as You can move a window to a different position on your screen by dragging… The primary purpose of an operating system is: In layered approach each layer uses the functions and services of ------------------ The operating system is the most common type of ___ Software Which components appear in the initial Windows start up display? In case of ____________________transparency a file can transparently move… Recently deleted files are stored in The command used to create logical drive for specific location of disk The ______________ unpacks the call receipt messages from local RPC Runtime… In case of good process migration mechanism, _____________ means failure… ____________approach can place the data directly into the memory or take… A bar that inform you the available options in your computer, opened applications,… The date and time displays on