_______ is the tool used for this purpose.
(a) Powersploit
(b) Aircrack – ng
(c) Snort
(d) Nmap
The question was asked by my school principal while I was bunking the class.
Asked question is from Generic Steps for Security in section Cyber Security of Cyber Security