Which technology requires an eavesdropper to send packets in order to solicit and capture a response, and potentially poison receiving hosts and/or infrastructure devices with the intent of receiving packets addressed to other hosts?

Q&A Education