which of the following features would be used to redirect network traffic for filtering or monitoring?
Which of the following security threats requires the attacker to be physically located near the target machine?