PrepAway - Latest Free Exam Questions & Answers

Which of the following is an attack in which a secret value like a hash is captured and then reused at a later

Which of the following is an attack in which a secret value like a hash is captured and then reused at a later time to gain access to a system without ever decrypting or decoding the hash.

PrepAway - Latest Free Exam Questions & Answers

A.
Brute Force Attacks

B.
John the Ripper Attacks

C.
Cryptography Attacks

D.
Replay Attacks

Explanation:
A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it.


Leave a Reply