Active attacks include altering message contents, masquerading as someone else, denial of ______, and planting ______.
举一反三
- Whatever a speaker communicates to someone else is termed the __________. A: channel B: message C: code D: feedback
- Mr. Brown wasn't in his car; he was driving ____________ car. A: someone's else B: someone else C: someone else's D: someone's else's
- Jack wasn’t in his own car. He was driving___ car. A: someone’s else B: someone else C: someone else’s D: someone’s else’s
- Introducing someone to someone else
- This book is not mine. It must be ______. A: someone else’s B: some other people C: any more people D: someone else