amori9304 amori9304 01-01-2024 Computers and Technology contestada Which technology requires an eavesdropper to send packets in order to solicit and capture a response, and potentially poison receiving hosts and/or infrastructure devices with the intent of receiving packets addressed to other hosts?