An attacker uses a network sniffer to capture the packets of a transaction that adds $20 to a gift card. The attacker then user a function of the sniffer to push those packets back onto the network again, adding another $20 to the gift card. This can be done many times. Which of the following describes this type of attack?
A. Integer overflow attack
B. Smurf attack
C. Replay attack
D. Buffer overflow attack
E. Cross-site scripting attack
Answer: C. Replay attack
Computer Science & Information Technology
You might also like to view...
Right-clicking a button on the taskbar produces a ________ displaying destinations and tasks
A) path B) contextual tab C) Jump List D) shortcut menu
Computer Science & Information Technology
Double-click the Format Painter button to apply formatting to a single selection
Indicate whether the statement is true or false
Computer Science & Information Technology
EFS now uses _____ for encryption
Fill in the blank(s) with correct word
Computer Science & Information Technology
To create a media query within a Hypertext Markup Language (HTML) file, the style attribute should be added to the link element in the document head.?
Indicate whether the statement is true or false.
Computer Science & Information Technology