Which of the following is true related to network sniffing?

A.
Sniffers allow an attacker to monitor data passing across a network.
B.
Sniffers alter the source address of a computer to disguise and exploit weak authentication
methods.
C.
Sniffers take over network connections
D.
Sniffers send IP fragments to a system that overlap with each other.
Explanation:
Sniffing is the action of capture / monitor the traffic going over the network. Because, in a normal
networking environment, account and password information is passed along Ethernet in clear-text, it
is not hard for an intruder to put a machine into promiscuous mode and by sniffing, compromise all
the machines on the net by capturing password in an illegal fashion.