Which of the following tools did the attackers MOST likely use to accomplish this?

An administrator believes that the network has been attacked and MAC addresses have
been captured allowing unauthorized computers to access the network. Which of the
following tools did the attackers MOST likely use to accomplish this?

An administrator believes that the network has been attacked and MAC addresses have
been captured allowing unauthorized computers to access the network. Which of the
following tools did the attackers MOST likely use to accomplish this?

A.
Intrusion prevention software

B.
Packet sniffer

C.
Intrusion detection software

D.
Port scanner



Leave a Reply 0

Your email address will not be published. Required fields are marked *