Which of the following attacks capture the secret value like a hash and reuse it later to gain access to a system without ever decrypting or decoding the hash?
A. Cross Site Scripting attack
B. Replay attack
C. Rainbow attack
D. Hashing attack
Answer: B
No comments:
Post a Comment
Note: only a member of this blog may post a comment.