Fill in the blank.
A network administrator discovers a rogue AP in the network. The rogue AP is capturing traffic and then forwarding it on to the legitimate AP. This type of attack is known as a man-in -the -middle attack.
Exam with this question: CCNA 3 (v5.0.3 + v6.0) Chapter 4 Exam Answers