An administrator believes that the network has been attacked and MAC addresses have
been captured allowing unauthorized computers to access the network. Which of the
following tools did the attackers MOST likely use to accomplish this?
A.
Intrusion prevention software
B.
Packet sniffer
C.
Intrusion detection software
D.
Port scanner