Which part of the UDP header would attackers replace if they change the data payload to prevent the receiver from identifying the change?
A. source port
B. destination port
C. UDP length
D. UDP port
E. UDP checksum
Which part of the UDP header would attackers replace if they change the data payload to prevent the receiver from identifying the change?
A. source port
B. destination port
C. UDP length
D. UDP port
E. UDP checksum