Emily is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?
A. Brute-force attack
B. Dictionary attack
C. Social engineering attack
D. Replay attack
Ans: D. Replay attack
Computer Science & Information Technology
You might also like to view...
In order to share a presentation online using the Share option, you must have a Microsoft account
Indicate whether the statement is true or false
Computer Science & Information Technology
To deactivate a comment, right-click the comment and select ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
DVD stands for:
a. Digital Versatile Disc b. Digital Video Disc c. Duplicated Virtual Disc d. Density-Variable Disc e. Double-View Disc
Computer Science & Information Technology
A screenplay unfolds over a series of scenes, and the plot determines the structure of the story.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology