A network analyst received a number of reports that impersonation was taking place on the network. Session tokens were deployed to mitigate this issue and defend against which of the following attacks?

  • Replay
  • DDos
  • Smurf
  • Phishing

Your Score:
Network Security
Compliance and Operational Security
Threats and Vulnerabilities
Application, Data and Host Security
Access Control and Identity Management
Cryptography
CompTIA Security+ SY0-401
  • Network Security
  • Compliance and Operational Security
  • Threats and Vulnerabilities
    • This question is filed here
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cryptography