ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 84 - ECSS discussion

Report
Export

Stephen, an attacker, decided to gain access to an organization's server. He identified a user with access to the remote server. He used sniffing programs to gain the user's credentials and captured the authentication tokens transmitted by the user. Then, he transmitted the captured tokens back to the server to gain unauthorized access.

Identify the technique used by Stephen to gain unauthorized access to the target server.

A.

Brute-force attack

Answers
A.

Brute-force attack

B.

Internal monologue

Answers
B.

Internal monologue

C.

SQL injection

Answers
C.

SQL injection

D.

Replay attack

Answers
D.

Replay attack

Suggested answer: D

Explanation:

Stephen used areplay attacktechnique to gain unauthorized access to the target server. In this scenario, he captured authentication tokens transmitted by the user and then replayed those tokens back to the server to impersonate the user and gain access.

https://www.cynet.com/network-attacks/unauthorized-access-5-best-practices-to-avoid-the-next-data-breach/

asked 24/10/2024
Alexander Castro
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first