What are two software-based attacks that disable individual workstations and typically spread from user to user by e-mail? (Choose two)
Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?