CompTIA Exam Questions

Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order

Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order
to perform malicious activities?

A.
XSS

B.
SQL injection

C.
Directory traversal

D.
Packet sniffing