Multiple Choice
A __________ attack involves an adversary repeating a previously captured user response.
A) client
B) Trojan horse
C) replay
D) eavesdropping
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q8: Objects that a user possesses for the
Q12: Voice pattern, handwriting characteristics, and typing rhythm
Q15: A smart card contains an entire microprocessor.
Q18: A _ authentication system attempts to authenticate
Q31: The _ strategy is when users are
Q31: User authentication is the basis for most
Q32: Presenting or generating authentication information that corroborates
Q41: _ systems identify features of the hand,including
Q43: Authentication protocols used with smart tokens can
Q45: A _ is an individual to whom