Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?
A.
XSS
B.
SQL injection
C.
Directory traversal
D.
Packet sniffing
Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?
Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?
A.
XSS
B.
SQL injection
C.
Directory traversal
D.
Packet sniffing