Which two are examples of t threats (in stride)?
a. modifying a file without authorization
b. claiming that a package was never received
c. modifying intercepted network packets
d. using sql injection to read database tables?