Which of the following techniques is used to log network traffic?
Cracking
IP address spoofing
Tunneling
Sniffing
Submit