21. For security attacks, which of the following is NOT true.
(A) Replaying attack includes several strategies to slow down or totally interrupt
the service of the system.
(B) Snooping attack refers to unauthorized access to or interception of data. An
unauthorized entity may intercept the transmission and use the contents for
their own benefit.
(C) Masquerading (spoofing) attack happens when the attacker impersonates
somebody else.
(D) Modification attack modifies the information to make it beneficial to the
attackers.
(E) Repudiation attack is performed by one of the sender or the receiver to deny
that the message has been sent or received.