Which of the following is an attack in which a secret value like a hash is captured and then reused at a later time to gain access to a system without ever decrypting or decoding the hash?
a. Replay Attack b. Brute Force Attack c. Man-in-the-Middle Attack d. Birthday Attack