How can an attacker observe network traffic exchanged between two users?

Posted by: Pdfprep Category: 210-250 Tags: , ,

How can an attacker observe network traffic exchanged between two users?
A . port scanning
B . denial of service
C . command injection
D . main-in-the-middle

Answer: D

Leave a Reply

Your email address will not be published.