An attacker replaces a digitally signed document with another version that goes unnoticed. Upon reviewing the document's contents, the author notices some additional verbiage that was not originally in the document but cannot validate an integrity issue. Which of the following attacks was used? A. Cryptomalware B. Hash substitution C. Collision D. Phishing Correct Answer: C This question is in SY0-601 exam For getting CompTIA Security+ certificate
Please login or Register to submit your answer