Replay Attacks

Replay Attacks

Assessment

Interactive Video

Computers

9th - 12th Grade

Hard

Created by

Jordan Macurak

FREE Resource

4 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary characteristic of a replay attack?

An attacker intercepts and modifies data in real-time.

An attacker reuses previously captured data to impersonate a legitimate user.

An attacker floods a network with excessive traffic to cause a denial of service.

An attacker tricks a user into revealing sensitive information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is effective in preventing "pass the hash" attacks?

Using a physical network tap.

Implementing ARP poisoning.

Employing malware on the victim's computer.

Using encryption and salting with unique authentication hashes.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is session hijacking (sidejacking)?

An attack where an attacker gains access to a server by guessing common passwords.

An attack where an attacker intercepts and uses a legitimate user's session ID to impersonate them.

An attack that involves sending malicious code to a web browser to steal data.

An attack that redirects network traffic through an attacker's machine.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most effective method to prevent session hijacking?

Using a personal VPN for part of the journey.

Encrypting communication end-to-end.

Regularly clearing browser cookies.

Disabling JavaScript in the browser.