Respuesta :

Answer:

Explanation:

spoofing and session hijacking - where the attacker gains access to network data and resources by assuming the identity of a valid user. eavesdropping - where unauthorised third-parties intercept the data being transmitted over the secure network.