Which of the following attacks is best described as an attacker capturing part of a communication, and then later sending some or all of that communication to a server while pretending to be the original client?

Which of the following attacks is best described as an attacker capturing part of a communication, and then later sending some or all of that communication to a server while pretending to be the original client?



A. Replay attack
B. TCP/IP hijacking
C. Backdoor
D. Man-in-the-middle attack




Answer: A


Learn More :