Martin, a Certified Ethical Hacker (CEH), is conducting a penetration test on a large enterprise network. He suspects that sensitive information might be leaking out of the network. Martin decides to use network sniffing as part of his testing methodology. Which of the following sniffing techniques should Martin employ to get a comprehensive understanding of the data flowing across the network?
qtygbapjpesdayazko
7 months, 3 weeks agobrrbrr
9 months agoinsaniunt
9 months, 2 weeks agororahir
9 months, 2 weeks ago