While testing an automated bottling assembly, an attacker captures legitimate commands from the network and resends them, causing equipment to repeat actions. Which technique is demonstrated by this behavior?
Sends earlier instructions again to trigger repeated actions on machinery
Logs in using the system’s factory-set password to gain control
Alters each packet by injecting malicious data before forwarding
Directs traffic through a rogue access point to capture user secrets
Reusing earlier requests allows the attacker to replicate valid actions without needing new authentication. This is distinct from changing the content of intercepted data, taking over endpoints, or leveraging default logins. Each incorrect option describes either inserting different payloads, rerouting connections, or relying on easy-to-guess passwords, but does not involve retransmitting a previously valid command sequence.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a replay attack, and how does it apply to this scenario?
Open an interactive chat with Bash
How can systems protect against replay attacks?
Open an interactive chat with Bash
What are some real-world examples of replay attacks?