An administrator believes that the network has been attacked and MAC addresses have been captured allowing unauthorized computers to access the network. Which of the following tools did the attackers MOST likely use to accomplish this?
A.
Intrusion prevention software
B.
Packet sniffer
C.
Intrusion detection software
D.
Port scanner