Describe the capabilities of a sniffer.

What will be an ideal response?


A sniffer is a program or device that can monitor data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information from a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal. Sniffers often work on TCP/IP networks, where they're sometimes called packet sniffers. Sniffers add risk to the network because many systems and users send information on local networks in clear text. A sniffer program shows all the data going by, including passwords, the data inside files, and screens full of sensitive data from applications.

Computer Science & Information Technology

You might also like to view...

Use the saved data to draw the spanning tree for the network in Figure 6.10 as seen by the bridges. For each bridge, include information on the root bridge, the root port, the designated ports, and the blocked ports.

What will be an ideal response?

Computer Science & Information Technology

Choose a type of chart that relays the message that you want to convey.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is not a factor for fair use?  ____

A. Purpose and character of use B. Intent and whether you make money C. Nature of copyright work D. Amount of work used

Computer Science & Information Technology

____ is the default document type when you install Dreamweaver.

A. XHTML 1.0 Transitional B. HTML 1.0 Transitional C. HTML 1.1 Transitional D. HTML 1.1

Computer Science & Information Technology