2.4k views
0 votes
In a(n) ____________________ attack, the attacker monitors (or sniffs) packets from the network, modifies them using Internet Protocol spoofing techniques, and then inserts them back into the network.

User Cespon
by
4.9k points

1 Answer

3 votes

Answer:

cyber attack

Step-by-step explanation:

User ShadowMare
by
4.4k points