oliviapug7595 oliviapug7595 18-08-2022 Computers and Technology Answered Zariah is writing an email to an employee about a wireless attack that is designed to capture the wireless transmissions from legitimate users. which type of attack is zariah describing?