iwangodfrey iwangodfrey 17-04-2024 Computers and Technology Answered ___________involve packet interception. They are very difficult to engineer but their potential to do harm is exceptional. Question 39Answer a. SYN Flood b. DoS and DDoS c. Man in the middle attacks d. Address spoofing