________ is a type of attack in which the attacker takes control of a session between
two machines and masquerades as one of them.
•
Question 4
What is meant by promiscuous mode?
•
Question 5
A protocol analyzer or ____________ is a software program that enables a computer
to monitor and capture network traffic.
•
Question 6