New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus ITS-110 Exam - Topic 3 Question 45 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 45
Topic #: 3
[All ITS-110 Questions]

A hacker wants to record a live session between a user and a host in hopes that parts of the datastream can be used to spoof the session. Which of the following attacks is this person attempting?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Pansy
3 months ago
Bit flipping? Nah, that's not even close.
upvoted 0 times
...
Felton
3 months ago
No way, it's clearly session replay.
upvoted 0 times
...
Denise
4 months ago
Wait, are we sure it's not fuzzing? Seems a bit off.
upvoted 0 times
...
Joanna
4 months ago
Agreed, it's all about capturing that data stream.
upvoted 0 times
...
Annamae
4 months ago
That's definitely a session replay attack.
upvoted 0 times
...
Sommer
4 months ago
Definitely leaning towards session replay. We had a similar question about capturing data streams last week, and it was the same concept.
upvoted 0 times
...
Buddy
5 months ago
I’m a bit confused. Fuzzing doesn’t seem to fit, but I can’t recall the specifics of bit flipping. Could it be one of those?
upvoted 0 times
...
Halina
5 months ago
I remember discussing session replay in class, and it seems like the right answer since the hacker is trying to capture the session data.
upvoted 0 times
...
Laila
5 months ago
I think this might be related to session replay attacks, but I'm not entirely sure. It sounds familiar from our last practice exam.
upvoted 0 times
...
Bettina
5 months ago
This is a classic session replay attack. The hacker is trying to record the live session so they can replay it later and impersonate the user. I'm confident that's the correct answer here.
upvoted 0 times
...
Delisa
5 months ago
I'm a bit confused on this one. The question mentions recording the session, but I'm not sure if that automatically means session replay. I'll have to review my notes on the different types of attacks to make sure I choose the right one.
upvoted 0 times
...
Devon
5 months ago
Session replay is the obvious choice here. The hacker wants to record the session to use parts of the datastream to spoof the session, which is exactly what a session replay attack is.
upvoted 0 times
...
Lonny
5 months ago
Hmm, I'm not sure about this one. Fuzzing, bit flipping, and reverse shell all seem like possible attacks the hacker could be attempting. I'll have to think this through carefully.
upvoted 0 times
...
Lonna
5 months ago
This one seems pretty straightforward. The hacker is trying to record the session to replay it later, so I'm going with Session replay.
upvoted 0 times
...
Nada
5 months ago
Ugh, these policy questions can be tricky. I'll have to really focus and make sure I don't overthink this. Gotta stay calm and apply what I know about acceptable use guidelines.
upvoted 0 times
...
Haley
1 year ago
Session replay? More like 'session creepy-play', if you ask me. This hacker's got some serious stalker vibes going on.
upvoted 0 times
...
Jerlene
1 year ago
Session replay, eh? Sounds like the hacker's trying to get a front-row seat to the action. I hope the user's got some popcorn ready!
upvoted 0 times
Dannette
1 year ago
C: Hopefully the host and user are vigilant and can detect any suspicious activity.
upvoted 0 times
...
Irene
1 year ago
B: Yeah, they can use that data to try and impersonate the user and gain unauthorized access.
upvoted 0 times
...
Eric
1 year ago
A: Session replay allows the hacker to record everything that's happening in the session.
upvoted 0 times
...
...
Merlyn
1 year ago
Session replay, huh? I bet this hacker's got some mad skills, but I'm not sure they're using them for good.
upvoted 0 times
Alpha
1 year ago
We should always be cautious of potential security threats.
upvoted 0 times
...
Brock
1 year ago
The hacker could use the recorded session to gain unauthorized access.
upvoted 0 times
...
Marleen
1 year ago
I heard it's a common attack used to impersonate users.
upvoted 0 times
...
Sabina
1 year ago
Yeah, session replay can be dangerous in the wrong hands.
upvoted 0 times
...
...
Kenneth
1 year ago
But could it also be a Reverse shell attack to gain control of the host?
upvoted 0 times
...
Dyan
1 year ago
Ooh, session replay? Sounds like a fun party trick, but I'm pretty sure the hacker's not trying to entertain anyone here.
upvoted 0 times
Marylin
1 year ago
D: They're definitely up to no good with that session replay attack.
upvoted 0 times
...
Coleen
1 year ago
C: It's a sneaky way to try and spoof the session.
upvoted 0 times
...
Lisbeth
1 year ago
B: Yeah, the hacker is trying to record the session to use it maliciously.
upvoted 0 times
...
Farrah
1 year ago
A: Definitely not a party trick, session replay is a serious attack.
upvoted 0 times
...
...
Onita
1 year ago
I agree with Adaline, session replay makes sense for spoofing the session.
upvoted 0 times
...
Adaline
1 year ago
I think the hacker is attempting a Session replay attack.
upvoted 0 times
...

Save Cancel