Microsoft Exam Questions

Which of the following is the process used by attackers for listening to the network traffic?

Which of the following is the process used by attackers for listening to the network traffic?

A.
Eavesdropping

B.
Subnetting

C.
Sanitization

D.
Hacking