Passive attacks - Eavesdropping
Choose the relevant options that are examples of eavesdropping:
How the attacker gathers information from the system in eavesdropping?
Which of the following is a type of eavesdropping attack that involves capturing data from wireless networks?