An attacker uses a network sniffer to capture the packets of a transaction that adds $20 to a gift card. The attacker then user a function of the sniffer to push those packets back onto the network again, adding another $20 to the gift card. This can be done many times. Which of the following describes this type of attack?

A. Integer overflow attack
B. Smurf attack
C. Replay attack
D. Buffer overflow attack
E. Cross-site scripting attack


Answer: C. Replay attack

Computer Science & Information Technology

You might also like to view...

Right-clicking a button on the taskbar produces a ________ displaying destinations and tasks

A) path B) contextual tab C) Jump List D) shortcut menu

Computer Science & Information Technology

Double-click the Format Painter button to apply formatting to a single selection

Indicate whether the statement is true or false

Computer Science & Information Technology

EFS now uses _____ for encryption

Fill in the blank(s) with correct word

Computer Science & Information Technology

To create a media query within a Hypertext Markup Language (HTML) file, the style attribute should be added to the link element in the document head.?

Indicate whether the statement is true or false.

Computer Science & Information Technology