An attacker uses a network sniffer to capture the packets of a transaction that adds $20 to a gift card. The attacker then user a function of the sniffer to push those packets back onto the network again, adding another $20 to the gift card. This can be done many times. Which of the following describes this type of attack?
A. Integer overflow attack
B. Smurf attack
C. Replay attack
D. Buffer overflow attack
E. Cross-site scripting attack
Answer: C. Replay attack
Computer Science & Information Technology
You might also like to view...
A bug is a flaw in programming of a software application
Indicate whether the statement is true or false
Computer Science & Information Technology
Forms of the if statement include one-way, two-way, ____________, multiway, and compound.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology