1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
2 years ago
15

If you're connected to a switch and your NIC is in promiscuous mode, what traffic would you be able to capture

Computers and Technology
1 answer:
Yuri [45]2 years ago
8 0

If you're connected to a switch and your NIC is in promiscuous mode, the traffic would you be able to capture would be broadcast traffic.

<h3>What is Broadcast traffic?</h3>

Broadcast traffic is used to send packets to all hosts on the network using the network's broadcast address. With a broadcast, the packet contains a destination IP address that only has numbers one (1s) in the host portion. This means that all hosts on that local network (broadcast domain) will receive and verify the packet. Many network protocols, such as DHCP, use broadcasts. When a host receives a packet sent to the network's broadcast address, the host processes the packet as a packet addressed to its unicast address.

Also, there are two types of broadcasts: directed broadcast and limited broadcast.

See more about computing at: brainly.com/question/10873104

#SPJ1

You might be interested in
Someone learn me more American Sign Language (ASL). Please.
sveticcg [70]

Answer:

Ok I will

Explanation:

3 0
3 years ago
In which of the following locations can you edit all of the Properties of a PowerPoint file?
Lapatulllka [165]
Access the File<span> menu, choose </span>Info Pane<span> to get to </span>Backstage view, you can see Properties on t<span>he area on the right side </span>of the current PowerPoint presentation.  <span>Within the </span>Properties<span> pane click the </span>Show All Properties<span>  option , T</span><span>his will displays properties such as </span>Size<span>, the number of </span>Slides<span>,  </span>Hidden Slides<span>, the number of </span>Multimedia Clips, etc.  Some of the entries are editable w<span>ithin the  </span>Properties pane, and some are not. Just move your mouse cursor over any detail of a property. The editable sections will change the cursor into edit mode.  
6 0
3 years ago
)Which of following can be thrown using the throwstatement?
Amanda [17]

Answer:

All of Given

Explanation:

The throw keywords can be used to throw any Throwable object. The syntax is :

throw <Throwable instance>

Note that Error and Exception are subclasses of Throwable while RuntimeException is a subclass of Exception. So the hierarchy is as follows:

Throwable

-- Error

-- Exception

   -- RuntimeException

And all of these are valid throwable entities. As a result "All of Given" is the most appropriate option for this question.

6 0
3 years ago
Read 2 more answers
3. Write a script that uses an anonymous block of PL/SQL code that attempts to insert a new flight into the flights table for fl
Irina18 [472]

Answer:

We will use script in oracle and SQl(Structured Query Language) and use of algorithms like cipher for encryption to insert a new flight into the flights table for the flight number 165 and that Cipher will show the desired message.

5 0
3 years ago
Is this free? do i have to pay to use this app??
Virty [35]
No i don’t have to pay but there is additional stuff if you pay but i don’t pay for anything
3 0
3 years ago
Other questions:
  • What phrase best describes the overall structure of the<br> passage
    9·1 answer
  • You want to implement a mechanism that automates ip configuration, including ip address, subnet mask, default gateway, and dns i
    14·1 answer
  • What is an input, output and storage device?
    12·1 answer
  • __ is/are the amount of blank space between lines of text in a paragraph
    7·2 answers
  • Give 5 uses of software and hardware.
    15·1 answer
  • 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
    7·1 answer
  • If two egg cells are fertilized what will happen?
    10·1 answer
  • In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a)
    14·1 answer
  • What is a fire wall and how does it work
    14·1 answer
  • HELP ME?!!?!?!?!?!?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!