200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

How does an attacker observe network traffic exchanged between two users?

  • A . port scanning
  • B . man-in-the-middle
  • C . command injection
  • D . denial of service
Answer: Option B.
Explanation: 

No answer description available for this question.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
error: Alert: Content is protected !!

Adblock Detected

Please consider supporting us by disabling your ad blocker