1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
2 years ago
15

If you're connected to a switch and your NIC is in promiscuous mode, what traffic would you be able to capture

Computers and Technology
1 answer:
Yuri [45]2 years ago
8 0

If you're connected to a switch and your NIC is in promiscuous mode, the traffic would you be able to capture would be broadcast traffic.

<h3>What is Broadcast traffic?</h3>

Broadcast traffic is used to send packets to all hosts on the network using the network's broadcast address. With a broadcast, the packet contains a destination IP address that only has numbers one (1s) in the host portion. This means that all hosts on that local network (broadcast domain) will receive and verify the packet. Many network protocols, such as DHCP, use broadcasts. When a host receives a packet sent to the network's broadcast address, the host processes the packet as a packet addressed to its unicast address.

Also, there are two types of broadcasts: directed broadcast and limited broadcast.

See more about computing at: brainly.com/question/10873104

#SPJ1

You might be interested in
Can someone help me?
stich3 [128]

Answer:

2nd one

Explanation:

7 0
3 years ago
Read 2 more answers
Survey data can be collected with questionnaires. Which type of question has a limited number of preselected responses?
nadya68 [22]
The answer to your problem is B
8 0
3 years ago
Write a program that plays the popular scissor-rockpaper game. (A scissor can cut a paper, a rock can knock a scissor, and a pap
kolbaska11 [484]

Answer:

import random

computer = random.randint(0, 2)

user = int(input("scissor (0), rock (1), paper (2): "))

if computer == 0:

   if user == 0:

       print("The computer is scissor. You are scissor too. It is a draw")

   elif user == 1:

       print("The computer is scissor. You are rock. You won")

   elif user == 2:

       print("The computer is scissor. You are paper. Computer won")

elif computer == 1:

   if user == 0:

       print("The computer is rock. You are scissor. Computer won")

   elif user == 1:

       print("The computer is rock. You are rock too. It is a draw")

   elif user == 2:

       print("The computer is rock. You are paper. You won")

elif computer == 2:

   if user == 0:

       print("The computer is paper. You are scissor. You won")

   elif user == 1:

       print("The computer is paper. You are rock. Computer won")

   elif user == 2:

       print("The computer is paper. You are paper too. It is a draw")

Explanation:

*The code is in Python.

Import the random to be able to generate number number

Generate a random number between 0 and 2 (inclusive) using randint() method and set it to the computer variable

Ask the user to enter a number and set it to the user variable

Check the value of computer the computer variable:

If it is 0, check the value of user variable. If user is 0, it is a draw. If user is 1, user wins. If user is 2, computer wins

If it is 1, check the value of user variable. If user is 0, computer wins. If user is 1, it is a draw. If user is 2, user wins

If it is 2, check the value of user variable. If user is 0, user wins. If user is 1, computer wins. If user is 2, it is a draw

8 0
3 years ago
What happens once the Insert tab is used in PowerPoint to insert a chart into a presentation?
nordsb [41]

Answer:

•The user can edit the chart directly. hoped i;m right

Explanation:

6 0
3 years ago
Once the term of copyright has expired,a work
rosijanka [135]
...??????????????????
8 0
3 years ago
Other questions:
  • Please help me please and thank you!
    14·1 answer
  • Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
    15·1 answer
  • which computer career field enables you to create and design interactive multimedia products and services
    14·1 answer
  • Implement a Python function with the signature Transfer(S, T) that transfers all elements from the ArrayStack instance S onto th
    13·1 answer
  • Which of the following are considered transactions in an information system?
    13·1 answer
  • Please answer the following in python: Answering the ones that have #TODO
    14·1 answer
  • One rule in the Java programming language is that you have to place a semicolon at the end of each statement. What is this rule
    10·2 answers
  • I need some help-
    15·1 answer
  • Resource _____ let you view, manage, and automate tasks on multiple aws resources at a time.
    9·1 answer
  • Lots of Ways to Use Math.random() in JavaScript
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!