1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dalvyx [7]
3 years ago
11

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d

evice connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation, not other devices. Which feature should you configure
Computers and Technology
1 answer:
Alecsey [184]3 years ago
6 0

Answer:

Promiscuous mode

Explanation:

You might be interested in
Cd-roms typically use the _______ filesystem type.
marissa [1.9K]
CD-<span>ROMs typically use the ____ filesystem type</span>
8 0
3 years ago
Wht is RAM called Random Access memory and ROM IS called Read only memory​
nasty-shy [4]

Answer: Computer memory is of two basic type – Primary memory(RAM and ROM) and Secondary memory(hard drive,CD,etc.). Random Access Memory (RAM) is primary-volatile memory and Read Only Memory (ROM) is primary-non-volatile memory.

Explanation: Hope this helps :)

6 0
3 years ago
8. T/F: At the bottom of a slide you are working on you can enter notes to indicate what yo
Crazy boy [7]

Answer: True. Hope it helps!

4 0
3 years ago
When operating a user interacts with
forsale [732]

Answer:

The operating system

Explanation:

8 0
2 years ago
Which command would you use on a switch to enable management from a remote network?
Savatey [412]
<span>IP default-gateway 192.168.10.185</span>
7 0
3 years ago
Other questions:
  • Which of the following is the rarest and most valuable mineral ore among the native elements?
    13·1 answer
  • 15)Which of the following statements is generally true about a V8 engine...
    10·1 answer
  • Which group on the Home Tab allows you to add shapes to a PowerPoint slide?
    9·2 answers
  • Write a program to generate personalized junk mail. The program takes input both from an input file and from the keyboard.The in
    14·1 answer
  • Give an O(log m + log n)-time algorithm that takes two sorted lists of sizes m and n, respectively, as input and returns the ith
    7·1 answer
  • Emily loves her job as an executive recruiter for a large hospital located in Seattle, Washington. Part of Emily's job requires
    11·1 answer
  • Why do Selection Sort and Insertion Sort’s outer loops run 11 iterations if there are 12 elements in the array?
    7·1 answer
  • The function of while loop is
    14·1 answer
  • A(n) ________ is a chart based on PivotTable data.
    15·1 answer
  • If an ______ is caught dumping hazardous materials, that person can be prosecuted. Answer choices A) Employee B) Employer C) Bot
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!