PrepAway - Latest Free Exam Questions & Answers

Category: 312-38

Exam 312-38: EC-Council Network Security Administrator (ENSA)

Which of the following attacks is being used by Eve?

Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which
Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is
eavesdropping the conversation and keeps the password. After the interchange is over, Eve
connects to Bob posing as Alice; when asked for a proof of identity, Eve sends Alice’s password
read from the last session, which Bob accepts. Which of the following attacks is being used by
Eve?


Page 11 of 32« First...910111213...2030...Last »