Watch this video on YouTube
Which option best describes the primary objective of a "replay attack" in cyber-security?