a. Parallel access to law agencies |
b. Eavesdrop user sessions |
c. Sample packets to get information |
d. All of the above |
Answer: All of the above |
a. Parallel access to law agencies |
b. Eavesdrop user sessions |
c. Sample packets to get information |
d. All of the above |
Answer: All of the above |