What describes a repudiation attack?
A. An attempt to compromise accountability goals of the security
B. Stealing a private key to decrypt the data-in-transit
C. Unauthorized access to information to compromise confidentiality
D. A series of repetitive attacks to the physical information infrastructure
Active attacks
include data modification, denial of service (DoS), and repudiation attacks. Active attacks pose
threats to data integrity, availability, and accountability.