Answer:
Promiscuous mode
Explanation:
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device connected to the same hub that is connected to the router. When you run the software, you only see frames addresse…
✓ Promiscuous mode
There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.
Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.
They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software
Learn more from
brainly.com/question/14728460
Answer:
-Electronic mail. At least 85% of the inhabitants of cyberspace send and receive e-mail. ...
-Research.
-Downloading files.
-Discussion groups. ...
-Interactive games. ...
-Education and self-improvement. ...
-Friendship and dating. ...
-Electronic newspapers and magazines.
Answer: $420
Explanation: from the question above, mercy worked 42 hours at $10 an hour. Her total pay before tax is: 42 x 10 =
$420
you would be shocked, it can even kill you