Posted by: Pdfprep
Post Date: December 15, 2020
How can an attacker observe network traffic exchanged between two users?
A . port scanning
B . denial of service
C . command injection
D . main-in-the-middle
Answer: D
Leave a Reply