Which method of mitigating packet-sniffer attacks is the most effective?
A.
implement two-factor authentication
B.
deploy a switched Ethernet network infrastructure
C.
use software and hardware to detect the use of sniffers
D.
deploy network-level cryptography using IPsec, secure services, and secure protocols