Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam ECSS Topic 4 Question 81 Discussion

Actual exam question for Eccouncil's ECSS exam
Question #: 81
Topic #: 4
[All ECSS Questions]

Stephen, an attacker, decided to gain access to an organization's server. He identified a user with access to the remote server. He used sniffing programs to gain the user's credentials and captured the authentication tokens transmitted by the user. Then, he transmitted the captured tokens back to the server to gain unauthorized access.

Identify the technique used by Stephen to gain unauthorized access to the target server.

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Nickie
3 days ago
I'm not sure, but I think it could also be a brute-force attack.
upvoted 0 times
...
Selma
8 days ago
I agree with Doyle, replay attack makes sense in this scenario.
upvoted 0 times
...
Doyle
12 days ago
I think the technique used by Stephen is a replay attack.
upvoted 0 times
...

Save Cancel