B. Authentication
Explanation:
A replay attack occurs when an attacker intercepts and reuses valid authentication data (such as login credentials or session tokens) to gain unauthorized access. This attack compromises authentication because it allows an attacker to impersonate a legitimate user without needing to crack passwords or encryption.
Why not the other options?
A. Availability – A replay attack does not disrupt access to resources (like a DDoS attack would); it focuses on impersonation.
C. Confidentiality – While replay attacks may involve stolen credentials, the main concern is impersonation, not data secrecy.
D. Integrity – A replay attack does not alter data; it reuses existing valid credentials to authenticate fraudulently.
Since authentication is the primary security principle affected by replay attacks, it is the correct answer.
B. authentication.
A replay attack involves the malicious or fraudulent repeat or delay of a valid data transmission. This type of attack is primarily a concern for authentication processes, as it can allow an attacker to gain unauthorized access by intercepting and replaying messages, such as login requests, that were originally sent by a legitimate user.
Its D replay attack goes into the category Integrity concerns not confidentiality
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.FC0-U61 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
fcc_class
2 months agoTorrente
2 months, 1 week ago_denw
8 months, 2 weeks agoCircaG
10 months agododothebird84
1 year, 7 months ago