Which attack method involves listening to all isaca video

 ·  PT1H46M27S  ·  EN

cism video for which attack method involves listening to all traffic in a network to extract usernames and passwords?

Full Certification Question

Which attack method involves listening to all traffic in a network to extract usernames and passwords?