An attacker replaces a digitally signed document with another version that goes unnoticed. Upon reviewing the document’s contents, the author notices some additional verbiage that was not originally in the document but cannot validate an integrity issue. Which of the following attacks was used?
mvckenzi
Highly Voted 2 years, 4 months agoApplebeesWaiter1122
Highly Voted 2 years, 1 month agoJayysaystgis
Most Recent 6 months, 3 weeks agoMarleigh
1 year, 1 month agoFart2023
1 year, 1 month agobknum9
1 year, 4 months agokewokil120
1 year, 4 months agoalicia2024
1 year, 4 months agoshaneo007
1 year, 5 months agoAceVander
1 year, 6 months agoCloudninja117
1 year, 7 months agoTeleco0997
1 year, 7 months agoJayysaystgis
6 months, 3 weeks agoPropheticBettor
1 year, 7 months ago_Bihari_
1 year, 7 months agoSoleandheel
1 year, 7 months agoComPCertOn
1 year, 8 months agoPropheticBettor
1 year, 8 months ago