Emily is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

A. Brute-force attack
B. Dictionary attack
C. Social engineering attack
D. Replay attack


Ans: D. Replay attack

Computer Science & Information Technology

You might also like to view...

In order to share a presentation online using the Share option, you must have a Microsoft account

Indicate whether the statement is true or false

Computer Science & Information Technology

To deactivate a comment, right-click the comment and select ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

DVD stands for:

a. Digital Versatile Disc b. Digital Video Disc c. Duplicated Virtual Disc d. Density-Variable Disc e. Double-View Disc

Computer Science & Information Technology

A screenplay unfolds over a series of scenes, and the plot determines the structure of the story.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology