Q5.An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Answer : Option CExplaination / Solution: No Explaination.
Q8.Which visibility mode should be used when you want the features of the base class to be available to the derived class but not to the classes that are derived from the derived class?
Answer : Option CExplaination / Solution: No Explaination.