35.7k views
3 votes
Which two are examples of t threats (in stride)?

a. modifying a file without authorization
b. claiming that a package was never received
c. modifying intercepted network packets
d. using sql injection to read database tables?

User Shino C G
by
5.6k points

1 Answer

3 votes
T threats stands for Tampering threats, which include intentional modification of files in a way that would make them harmful to the users or also modification of packets transmitted in the network.
Modifying a file without authorization and Modifying intercepted network packets are two examples of T threats. Correct answer: A and C.


User Krish Kr
by
6.2k points