How does an attacker observe network traffic exchanged between two users?
A . port scanning
B . man-in-the-middle
C . command injection
D . denial of service
Answer: B
How does an attacker observe network traffic exchanged between two users?
A . port scanning
B . man-in-the-middle
C . command injection
D . denial of service
Answer: B