This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Chapter 4: Sniffers
1. Are there cases where a network sniffer is a legitimate application to be running?
2. What operating systems will support a packet-sniffing application?
3. Name four Linux-based packet sniffers.
4. Name four Windows-based packet sniffers.
5. What is a good way to keep sniffer technology from discovering your e-mail passwords?
6. What protocol would you consider for encrypting passwords?
7. What does a time domain reflectometer do?
8. What are the components of an average packet sniffer?
9. What is a MAC address?
10. What equipment uses a MAC address?
11. What feature of a NIC on a TCP/IP network does a sniffer exploit?
Indicate whether the sentence or statement is true or false.
12. ______ Sniffers are made for AppleTalk Networks.
13. ______ Ethernet networks can be made sniffer-proof.
14. ______ Running a sniffer in promiscuous mode is a class VI misdemeanor in many states.
15. ______ Snort is not a sniffer.
16. ______ EtherPeek only runs on SunOS.
17. ______ You can detect a sniffer from its characteristic sound.
18. ______ SSL is a protocol that makes data transmissions unintelligible to a hacker using a sniffer.
19. ______ Sniffers that are not resolving host names are almost impossible to detect.
20. ______ Strict control of who has administrative privileges can wipe out illicit sniffers on your
LAN.
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.