___________involve packet interception. They are very difficult to engineer but their potential to do harm is exceptional.
Question 39Answer

a.
SYN Flood

b.
DoS and DDoS

c.
Man in the middle attacks

d.
Address spoofing