A tool that is used to capture usernames and passwords on the network is known as a:

A. honey pot.
B. firewall.
C. sniffer.
D. proxy server

Answer: C. sniffer.

Computer Science & Information Technology

You might also like to view...

The copy constructor automatically executes when, as a parameter, an object is passed by ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which item in the accompanying figure is an input device?

A. 1 B. 2 C. 3 D. 4

Computer Science & Information Technology