Thursday 6 December 2018

GIAC GCIH Questions Answers

Which of the following attacks capture the secret value like a hash and reuse it later to gain access to a system without ever decrypting or decoding the hash?

A. Cross Site Scripting attack
B. Replay attack
C. Rainbow attack
D. Hashing attack

Answer: B

No comments:

Post a Comment

Note: only a member of this blog may post a comment.