PdfPrep.com

How can an attacker observe network traffic exchanged between two users?

How can an attacker observe network traffic exchanged between two users?
A . port scanning
B . denial of service
C . command injection
D . main-in-the-middle

Answer: D

Exit mobile version