Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?

Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?
A . XSS
B . SQL injection
C . Directory traversal
D . Packet sniffing

Answer: D

Latest N10-007 Dumps Valid Version with 601 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments