Which of the following techniques is used to log network traffic?
A.
IP address spoofing
B.
Tunneling
C.
Sniffing
D.
Cracking
Explanation:
Which of the following techniques is used to log network traffic?
Which of the following techniques is used to log network traffic?
A.
IP address spoofing
B.
Tunneling
C.
Sniffing
D.
Cracking
Explanation: