an attack in which the attacker simply listens for all traffic being transmitted across a network, in the hope of viewing something such as a user id and password combination, is known as: