Which of the following is true related to network sniffing?

A.
Sniffers allow an attacker to monitor data passing across a network.
B.
Sniffers alter the source address of a computer to disguise and exploit weak authentication
methods.
C.
Sniffers take over network connections
D.
Sniffers send IP fragments to a system that overlap with each other.
Explanation:
Sniffing is the action of capture / monitor the traffic going over the network.
Because, in a normal networking environment, account and password information is passed along
Ethernet in clear-text, it is not hard for an intruder to put a machine into promiscuous mode and by
sniffing, compromise all the machines on the net by capturing password in an illegal fashion.