a. Parameter tampering |
b. Data tampering |
c. Tampering of network topology |
d. Protocol tampering |
Answer: Parameter tampering |
a. Parameter tampering |
b. Data tampering |
c. Tampering of network topology |
d. Protocol tampering |
Answer: Parameter tampering |