Text Book1: Chapter 4
You should be submitted in Blackboard CTEC445\ HW4: See: Due Date in Blackboard
Part1: Grade (10 points)
- Are there cases where a network sniffer is a legitimate application to be running?
- What operating systems will support a packet-sniffing application?
- Name four Linux-based packet sniffers.
- Name four Windows-based packet sniffers.
- What is a good way to keep sniffer technology from discovering your e-mail passwords?
- What protocol would you consider for encrypting passwords?
- What does a time domain reflectometer do?
- What are the components of an average packet sniffer?
- What is a MAC address?
- What equipment uses a MAC address?
- What feature of a NIC on a TCP/IP network does a sniffer exploit?