1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antiseptic1488 [7]
3 years ago
5

Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can

constantly read all information entering the computer through the NIC by decoding the information encapsulated in the data packet. Passive sniffing is one of the types of sniffing. Passive sniffing refers to:
Sniffing through a hub
Sniffing through a router
Sniffing through a switch
Sniffing through a bridge
Computers and Technology
1 answer:
STatiana [176]3 years ago
7 0

Answer: Sniffing through a hub

Explanation:

When we sniff through a hub we are able to listen to all the data transmitted through to and fro from all the computers in the network. So it is better to perform passive sniffing which includes Sniffing through a hub.

You might be interested in
In order to plan George’s birthday, his father gave him a list of people who attended his birthday for the last five years. What
nikitadnepr [17]

Answer:

George should use "Average" to compute the expected number of guests.

Explanation:

Average is computed to find the central value of some given values to know the overall behavior of some particular event.

<u>For Example</u>

A student has 5 courses in a class, He got different marks in all the courses, to find his overall performance, average has been computed to find the overall behavior of the student. The Average value of marks rate the student in terms of overall performance.

In given case, George have list of No. of Guest who attended their last event. To find the expected number for Guest for his current Birthday, He observes the data and find the average No. of guest. Which means Guest are nearly to the Average value with a small margin.

4 0
3 years ago
Can someone help me explain Nvm scheduling in operating systems?
Marat540 [252]

Low-power and short-latency memory access is critical to the performance of chip multiprocessor (CMP) system devices, especially to bridge the performance gap between memory and CPU

3 0
3 years ago
When you hear or see the warning signal of any emergency vehicle, you should ________________.?
atroni [7]
You should move out the way
6 0
3 years ago
GUYS PLEASEEEE HELP !!!
Rina8888 [55]

Answer:

try to contact them by email

Explanation:

thats my best guess

4 0
4 years ago
Read 2 more answers
Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.
Gre4nikov [31]

Answer:

c

Explanation:

spongo  

7 0
4 years ago
Other questions:
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • Identify the function for the following computer part: CD-Drive Question 17 options: A. Storage B. Output C. Input D. Processing
    12·1 answer
  • PLEASE PLEASE PLEASE PLEASE HELP!!! I REALLY NEED HELP AND ILL GIVE U A BRAINLIEST IF UR RIGHT!!
    13·1 answer
  • Which of the following is where you can save, select a template, change document properties, and close or exit excel?
    8·1 answer
  • Which of the following is an example of an access object?
    9·1 answer
  • Which of the following is an example of metadata about a webpage?
    7·2 answers
  • I NEED THIS ASAP
    12·2 answers
  • When it comes to game mechanics, what is the most universal mechanic that is present in virtually every computer game that you c
    8·1 answer
  • What are the five generations of computer software​
    13·1 answer
  • The ____ line for any e-mail messages you write should clearly state the intention of the e-mail..
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!