Emily is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

A. Brute-force attack
B. Dictionary attack
C. Social engineering attack
D. Replay attack

Ans: D. Replay attack

Computer Science & Information Technology

You might also like to view...

Internet storage space is referred to as ________ storage

Fill in the blank(s) with correct word

Computer Science & Information Technology

Plaintext is recovered from the ciphertext using the paired key and _____________ .

A. a digital signature B. a recovery encryption C. a decryption algorithm D. an encryption algorithm

Computer Science & Information Technology