Which two are examples of t threats (in stride)?
a. modifying a file without authorization
b. claiming that a package was never received
c. modifying intercepted network packets
d. using sql injection to read database tables?
T threats stands for Tampering threats, which include intentional modification of files in a way that would make them harmful to the users or also modification of packets transmitted in the network. Modifying a file without authorization and Modifying intercepted network packets are two examples of T threats. Correct answer: A and C.