PdfPrep.com

Which of the following RFID attacks Jamie has performed in the above scenario?

Tecty Motors Pvt. Ltd. has recently deployed RFID technology in the vehicles which allows the car owner to unlock the car with the exchange of a valid RFID signal between a reader and a tag. Jamie, on the other hand, is a hacker who decided to exploit this technology with the aim of stealing the target vehicle. To perform this attack on the target vehicle, he first used an automated tool to intercept the signals between the reader and the tag to capture a valid RFID signal and then later used the same signal to unlock and steal the victim’s car.

Which of the following RFID attacks Jamie has performed in the above scenario?
A . RFID cloning
B . Replay attack
C . DoS attack
D . Power analysis attack

Answer: A

Exit mobile version