When conducting a penetration test, it is crucial to use all means to get all available informat
ion about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?
A. Identifying operating systems, services, protocols and devices
B. Modifying and replaying
captured network traffic
C. Collecting unencrypted information about usernames and passwords
D. Capturing a network traffic for further analysis