Suppose Alice and Bob are sending packets to each other over a computer network. SupposeTrudy positions herself in the network so that she can capture all the packets sent by Alice and sendwhatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wantsto Alice. List one active and one passive malicious thing that Trudy can do from this position.