Ask Question
22 December, 15:39

The attacker uses the following attack, in order to listen to the conversation between the user and the server and captures the authentication token of the user. With this authentication token, the attacker replays the request to the server with the captured authentication token and gains unauthorized access to the server.

A. Session Replay attack

B. Session Fixation attacks

C. Session hijacking using proxy servers

D. Client side attacks

+4
Answers (1)
  1. 22 December, 19:02
    0
    A. Session Replay attack

    Explanation:

    Session Replay attack -

    It is the illegal practice, where the attacker seals some valid session ID of any user and then can access the ID in order to person some illegal activity, is referred to as session replay attack.

    Similarly, from the question,

    The attacker somehow get to know the authentication token and then uses the authentication token in order to access the server and perform illegal activity.

    Hence, from the given scenario of the question,

    The correct term is session replay attack.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “The attacker uses the following attack, in order to listen to the conversation between the user and the server and captures the ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers