Martin, a Certi ed Ethical Hacker (CEH), is conducting a penetration test on a large enterprise network. He suspects that sensitive information might be leaking out of the network. Martin decides to use network sni ng as part of his testing methodology. Which of the following sni ng techniques should Martin employ to get a comprehensive understanding of the data owing across the network? A. Raw Sni ng B. MAC Flooding C. ARP Poisoning D. DNS Poisoning Correct Answer: A This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer