_____________ are programs or devices that capture the vital information from the target network or particular network.
(a) Routers
(b) Trappers
(c) Wireless-crackers
(d) Sniffers
The question was posed to me during an interview.
The doubt is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security