Refer to the exhibit.
What is the threat in this Wireshark traffic capture?
Click on the arrows to vote for the correct answer
D.