SY0-501 IT-Libraries Q&A Which of the following tools will the hacker use against this type of capture Q418