A tool that is used to capture usernames and passwords on the network is known as a:
A. honey pot.
B. firewall.
C. sniffer.
D. proxy server
Answer: C. sniffer.
Computer Science & Information Technology
You might also like to view...
The copy constructor automatically executes when, as a parameter, an object is passed by ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which item in the accompanying figure is an input device?
A. 1 B. 2 C. 3 D. 4
Computer Science & Information Technology