Passive attacks - Eavesdropping
Which of the following is a primary goal of an eavesdropping attack?
How does an attacker gather information from the system in eavesdropping?
Which of the following is a type of eavesdropping attack that involves capturing data from wireless networks?