PrepAway - Latest Free Exam Questions & Answers

Which of the following is an attack in which a secret value like a hash is captured…

Which of the following is an attack in which a secret value like a hash is captured and then reused at a later time to gain access to a system without ever decrypting or decoding the hash.

PrepAway - Latest Free Exam Questions & Answers

A.
Replay Attacks

B.
Brute Force Attacks

C.
Cryptography Attacks

D.
John the Ripper Attacks

Explanation:
A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it.


Leave a Reply