Question: Michael is engaged in a hostile takeover of a rival family business. He wants to acquire competitor data and use it to leverage his position. A. what tools could he use to capture date from a local ethernet network B. Explain what types of data he could capture from a local ethernet network