What protocol would you consider for encrypting passwords?

You should be submitted in Blackboard CTEC445\ HW4: See: Due Date in Blackboard

Part1: Grade (10 points)

TextBook1: Chapter 4

  1. Are there cases where a network sniffer is a legitimate application to be running?
  2. What operating systems will support a packet-sniffing application?
  3. Name four Linux-based packet sniffers.
  4. Name four Windows-based packet sniffers.
  5. What is a good way to keep sniffer technology from discovering your e-mail passwords?
  6. What protocol would you consider for encrypting passwords?
  7. What does a time domain reflectometer do?
  8. What are the components of an average packet sniffer?
  9. What is a MAC address?
  10. What equipment uses a MAC address?
  11. What feature of a NIC on a TCP/IP network does a sniffer exploit?