Networking Chapter 4 Sniffers Are There Cases Where Network Sniffer Legitimate Application Running Yes

subject Type Homework Help
subject Pages 3
subject Words 368
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 4: Sniffers
1. Are there cases where a network sniffer is a legitimate application to be running?
2. What operating systems will support a packet-sniffing application?
3. Name four Linux-based packet sniffers.
4. Name four Windows-based packet sniffers.
5. What is a good way to keep sniffer technology from discovering your e-mail passwords?
6. What protocol would you consider for encrypting passwords?
7. What does a time domain reflectometer do?
8. What are the components of an average packet sniffer?
9. What is a MAC address?
page-pf2
10. What equipment uses a MAC address?
11. What feature of a NIC on a TCP/IP network does a sniffer exploit?
Indicate whether the sentence or statement is true or false.
12. ______ Sniffers are made for AppleTalk Networks.
13. ______ Ethernet networks can be made sniffer-proof.
14. ______ Running a sniffer in promiscuous mode is a class VI misdemeanor in many states.
15. ______ Snort is not a sniffer.
16. ______ EtherPeek only runs on SunOS.
17. ______ You can detect a sniffer from its characteristic sound.
18. ______ SSL is a protocol that makes data transmissions unintelligible to a hacker using a sniffer.
19. ______ Sniffers that are not resolving host names are almost impossible to detect.
page-pf3
20. ______ Strict control of who has administrative privileges can wipe out illicit sniffers on your
LAN.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.