Which of the following is a technique that could be used to capture network user passwords? A、Encryption B、Sniffing C、Spoofing D、Data destruction