Answer:

.
<h3>
<em>A</em><em><u> objective</u></em><em><u> </u></em><em><u>of</u></em><em><u> technique</u></em><em> </em><em>describes a particular attribute of the dates item in a table</em><em>.</em></h3>
<em>.</em>
<em>I </em><em>hope</em><em> </em><em>this</em><em> </em><em>helps</em><em> </em><em>you</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em>
The type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.
<h3>What is replay attacks in security?</h3>
A replay attack is known to be a kind of security attack that is known to be done if or when a cybercriminal is said to spy on a secure network communication.
Note that by this, they tend to intercepts the message and then they can fraudulently delays or as well as resends it to misdirect the receiver into carrying out the thing that the hacker wants.
Hence, The type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.
learn more about digital data from
brainly.com/question/28346439
#SPJ1
Use the web for educational purposes.
Use the web for instructional reasons.
Use the web only when something you find interesting does not make sense to you.
Don’t use the web on a day to day basis.