1
.
____________________
is
the
easiest
attack
to
launch
since
all
the
packets
transit
through
the
attacker
.
All
the
?
plain
text
?
protocols
are
compromised
(
the
attacker
can
____________________
user
and
password
of
many
widely
used
protocol
such
as
telnet
,
ftp
,
http
)
2
.
____________________
isn't
blind
(
the
attacker
knows
exactly
the
sequence
numbers
of
the
TCP
connection
)
.
3
.
Within
____________________
,
the
attacker
can
modify
the
sequence
numbers
and
keep
the
connection
synchronized
while
injecting
packets
.
4
.
Within
____________________
,
the
attacker
can
modify
the
payload
of
the
packets
by
recalculating
the
checksum
.
5
.
Within
____________________
poisoning
,
the
attacker
can
forge
a
spoofed
ICMP
packets
to
force
the
host
to
make
an
ARP
request
.
Immediately
after
the
ICMP
it
sends
the
fake
____________________
replay
.
6
.
STP
____________________
is
not
a
real
MITM
attack
since
the
attacker
is
able
to
receive
only
?
unmanaged
?
traffic
.
7
.
Within
ICMP
redirect
,
the
attacker
can
forge
ICMP
redirect
packet
in
order
to
Redirect
____________________
to
himself
.
8
.
Within
IRDP
spoofing
,
The
attacker
can
forge
some
advertisement
packet
pretending
to
be
the
____________________
for
the
LAN
.
He
/
she
can
set
the
?
preference
level
?
and
the
?
lifetime
?
at
high
values
to
be
sure
the
hosts
will
choose
it
as
the
preferred
router
.