A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.
(a) Phishing site
(b) Sniffer tool
(c) Password cracker
(d) NIC cracker
I have been asked this question during an interview for a job.
I would like to ask this question from Attack Vectors in section Understanding Attack Vectors of Cyber Security