Which two are examples of t threats (in stride)?
a. modifying a file without authorization
b. claiming that a package was never received
c. modifying intercepted network packets
d. using sql injection to read database tables?

Respuesta :

T threats stands for Tampering threats, which include intentional modification of files  in a way that would make them harmful to the users or also modification of packets transmitted in the network.
Modifying a file without authorization and Modifying intercepted network packets are two examples of T threats. Correct answer: A and C.