Candi3449 Candi3449 07-02-2020 Computers and Technology contestada In a(n) ____________________ attack, the attacker monitors (or sniffs) packets from the network, modifies them using Internet Protocol spoofing techniques, and then inserts them back into the network.