Which of the following is an attack in which a secret value like a hash is captured and then reused at a later time to gain access to a system without ever decrypting or decoding the hash?

a. Replay Attack
b. Brute Force Attack
c. Man-in-the-Middle Attack
d. Birthday Attack

Q&A Education