Q: 20
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation
between two IP phones?
Options
Discussion
D imo, since eavesdropping between endpoints fits man-in-the-middle. Anyone disagree?
Be respectful. No spam.