Answer:
Network-based cyber attacks. ... These may be active attacks, wherein the hacker manipulates network activity in real-time; or passive attacks, wherein the attacker sees network activity but does not attempt to modify it
Answer:A
Explanation:
extension
frames I think plz don't hate me if I'm wrong
If you're on edge then it's
C) non-destructive, destructive, and constructive