Network Vulnerabilities Part 1
1.What can be deployed to intercept and log network traffic passing through the network?A) protocol analyzers 2.What attack involves impersonating another device?A) Spoofing 3.Packet sniffing can be helpful in detecting rogues.A) True 4.Which of the following is NOT a means…
