1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
2 years ago
7

Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes su

re their nics is not running in promiscuous mode
Computers and Technology
1 answer:
andrew11 [14]2 years ago
4 0

Answer:

Network Sniffing

Explanation:

Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.

You might be interested in
When the tcp\ip translates a network layer address into a data link layer address (after not finding an entry for the network la
Pavel [41]
When the network stack translates an IP address (network address) to a MAC address (data link address) it sends a broadcast using ARP to all devices on the subnet asking who has the specified IP address.  The device with that IP address will then respond with it's MAC address to the ARP message's source.

With this in mind the answer to your question would either be broadcast or ARP request depending on what you have been learning in class.
6 0
3 years ago
This operating system was used by individual computers and required users to type commands.
In-s [12.5K]

Answer:

MS-DOS is your answer

Explanation:

6 0
3 years ago
2) What is the value stored in the variable z by the statements below?
Dmitriy789 [7]

Answer:

7

Explanation:

Because the q.length is a inbuilt function in the programming which used to get the length of the array. In the array, there are 7 values are store. Therefore, the size 7 store in the variable z.

For example:

int[] array={1,2};

int x = array.length;

the answer of above code is 2, because the elements present in the array is 2.

 

5 0
3 years ago
Which component is in discreat type? A.power IC B.regular IC C.Resistor D.digital IC​
Finger [1]

Answer:

C. Resistor

Explanation:

A discrete component can be defined as any electronic component that are built as an individual or single unit.

Basically, a discrete component comprises of a single circuitry element, either an active element such as a vacuum tube, transistor etc or a passive element such as a resistor, diode, capacitor, inductor etc.

Hence, a discrete component is different from an integrated circuit (IC) or hybrid circuits because it is typically constructed or built with a single circuit element while integrated or hybrid circuits are constructed as a multiple unit.

Additionally, most discrete component are mainly semiconductors and as such consume large amounts of current.

5 0
3 years ago
Read 2 more answers
Marlene is using context clues to better understand the book she is reading. After reading around unfamiliar words and checking
Zigmanuir [339]

Answer: The correct answer is to look up the unfamiliar words in a dictionary or online.

Explanation: When using context clues to better understand reading, Marlene will first read around the unfamiliar words, looking for clues before and after the unfamiliar words. If she still does not know the meaning of an unfamiliar word her next step is to look up the word in a dictionary or online.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Here is a Test Code segment:
    13·1 answer
  • ______________ is only one of the marketing mix tools that acompany uses to achieve its marketing objectives.
    7·1 answer
  • 0001 0000 1100 0011 (unsigned, that is, interpreted as b2u)i.8 bit truncated value:ii.does the value change when truncated to 8
    7·1 answer
  • Explain how being a metal, metalloid, or non-metal affects conductivity
    10·1 answer
  • You work for a company that builds custom PCs for select clients. You are training a new employee to evaluate and select appropr
    13·1 answer
  • Plz subscribe my yt gaming channel <br>FIREAZZ GAMING​
    8·2 answers
  • Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
    8·1 answer
  • What is the output?<br> str = 'abcdef<br> print(str[2:50)
    6·2 answers
  • What Pre-Built PC should I get? I don't have a lot of money so I'm looking for cheap options.
    8·1 answer
  • What method is used in the following line of code to associate clicking the left button with the event handler "clickSingle"?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!