Of the following best describes a sniffing network attack?
a. monitoring and capturing data passing through a network
ob. analyzing network traffic to identify the configuration of the network
oc. querying a network to identify vulnerabilities
od. sending a fraudulent email toward gaining access to sensitive data
oe. flooding a network with data packets so it becomes dysfunctional