Answer:
Step-by-step explanation:
spoofing and session hijacking - where the attacker gains access to network data and resources by assuming the identity of a valid user. eavesdropping - where unauthorised third-parties intercept the data being transmitted over the secure network.