PdfPrep.com

How does an attacker observe network traffic exchanged between two users?

How does an attacker observe network traffic exchanged between two users?
A . port scanning
B . man-in-the-middle
C . command injection
D . denial of service

Answer: B

Exit mobile version