Describe the capabilities of a sniffer.
What will be an ideal response?
A sniffer is a program or device that can monitor data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information from a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal. Sniffers often work on TCP/IP networks, where they're sometimes called packet sniffers. Sniffers add risk to the network because many systems and users send information on local networks in clear text. A sniffer program shows all the data going by, including passwords, the data inside files, and screens full of sensitive data from applications.
You might also like to view...
Use the saved data to draw the spanning tree for the network in Figure 6.10 as seen by the bridges. For each bridge, include information on the root bridge, the root port, the designated ports, and the blocked ports.
What will be an ideal response?
Choose a type of chart that relays the message that you want to convey.
Answer the following statement true (T) or false (F)
Which of the following is not a factor for fair use? ____
A. Purpose and character of use B. Intent and whether you make money C. Nature of copyright work D. Amount of work used
____ is the default document type when you install Dreamweaver.
A. XHTML 1.0 Transitional B. HTML 1.0 Transitional C. HTML 1.1 Transitional D. HTML 1.1