Emily is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?
A. Brute-force attack
B. Dictionary attack
C. Social engineering attack
D. Replay attack
Ans: D. Replay attack
Computer Science & Information Technology
You might also like to view...
Internet storage space is referred to as ________ storage
Fill in the blank(s) with correct word
Computer Science & Information Technology
Plaintext is recovered from the ciphertext using the paired key and _____________ .
A. a digital signature B. a recovery encryption C. a decryption algorithm D. an encryption algorithm
Computer Science & Information Technology