ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 375 - SY0-601 discussion

Report
Export

A penetration tester was able to compromise a host using previously captured network traffic. Which of the following is the result of this action?

A.
Integer overflow
Answers
A.
Integer overflow
B.
Race condition
Answers
B.
Race condition
C.
Memory leak
Answers
C.
Memory leak
D.
Replay attack
Answers
D.
Replay attack
Suggested answer: D

Explanation:

A replay attack is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed12. This can allow an attacker to compromise a host by resending a previously captured message, such as a password or a session token, that looks legitimate to the receiver1. A replay attack can be prevented by using methods such as random session keys, timestamps, or one-time passwords that expire after use12. A replay attack is different from an integer overflow, which is a type of software vulnerability that occurs when an arithmetic operation attempts to create a numeric value that is too large to be represented within the available storage space3. A race condition is another type of software vulnerability that occurs when multiple processes access and manipulate the same data concurrently, and the outcome depends on the order of execution3. A memory leak is a type of software defect that occurs when a program fails to release memory that is no longer needed, causing the program to consume more memory than necessary and potentially affecting the performance or stability of the system3.

asked 02/10/2024
Instel SL
28 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first