How can an attacker observe network traffic exchanged between two users?
A . port scanning
B . denial of service
C . command injection
D . main-in-the-middle
Answer: D
How can an attacker observe network traffic exchanged between two users?
A . port scanning
B . denial of service
C . command injection
D . main-in-the-middle
Answer: D