header bg

Scan QR code or get instant email to install app

Question:

During a business trip, a user sends emails to clients via the hotel’s wireless connection. The user finds that the next day that emails have been sent from the user’s account without approval.
Of the following protocols, which one was run to compromise the user’s email password to utilize a network sniffer?

A HTTP
explanation

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*