Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order seenagape 12 years ago Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in orderto perform malicious activities? A.XSS B.SQL injection C.Directory traversal D.Packet sniffing ← Previous question Next question →