How does an attacker observe network traffic exchanged between two users?

How does an attacker observe network traffic exchanged between two users?
A . port scanning
B . man-in-the-middle
C . command injection
D . denial of service

Answer: B

Latest 200-201 Dumps Valid Version with 154 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments