GIAC GCIH Question Answer
Which of the following techniques does an attacker use to sniff data frames on a local area network and modify the traffic?
GIAC GCIH Question Answer
Which of the following techniques does an attacker use to sniff data frames on a local area network and modify the traffic?