Lisa, an administrator, believes that the network has been attacked and MAC addresses have been
captured allowing unauthorized computers to access the network. Which of the following tools did
the attackers MOST likely use to accomplish this?
A.
Intrusion prevention software
B.
Packet sniffer
C.
Intrusion detection software
D.
Port scanner