Sandra has used Ethereal, a packet sniffer, to listen in on network transmissions. She has
captured several passwords. What type of attack has been performed on her network?
A.
An active attack
B.
A man-the-middle attack
C.
A session hijacking
D.
A privilege escalation attack
E.
An illicit server attack
Explanation:
The type of attack described above is a man-in-the-middle attack.