17.ll of the following are characteristics of a man-in-the-middle (MITM) attack,
except:
(A) Intercepting data
(B) Altering and retransmitting data
(C) Spoofing both sides of the communications session
(D) Flooding the network with ICMP packers
答案:登入後查看
統計: A(0), B(0), C(0), D(1), E(0) #3557259
統計: A(0), B(0), C(0), D(1), E(0) #3557259