1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
2 years ago
7

Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes su

re their nics is not running in promiscuous mode
Computers and Technology
1 answer:
andrew11 [14]2 years ago
4 0

Answer:

Network Sniffing

Explanation:

Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.

You might be interested in
A server technician has been tasked with purchasing cables and connectors for a new server room. The server room consists of one
Rama09 [41]

Answer:

The answer is "Option b"

Explanation:

A straightforward cable is a form of twisted pair cable, which is used in the  LAN cable, it provides the connections to RJ-45 cable, that pinout to each end for the same connection. In this cable, that is a sequel, the same kind of computer was interlinked for used by the same routers ports, that's why the technician purchase this cable, and certain options were incorrect that can be described as follows:

  • In option a, It is used in the television, that's why it is wrong.
  • Option c and Option d both were wrong because It is used in telephones, that provides low-speed apps, and it terminates the network.
5 0
3 years ago
"Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer
ExtremeBDS [4]

Answer:

The Session layer (Layer 5)

Explanation:

The OSI (Open Systems Interconnection) seven-layer model is a reference model that explains how devices (or applications) communicate over the network. The model consists basically of seven different layers which are;

i. Layer 1 or the physical layer

ii. Layer 2 or the data-link layer

iii. Layer 3 or the network layer

iv. Layer 4 or the transport layer

v. Layer 5 or the Session layer

vi. Layer 6 or the presentation layer

vii. Layer 7 or the application layer.

Out of the seven layers, the session layer (layer 5) keeps track of a system's connections to send the right response to the right computer by setting up, coordinating and managing these connections. It controls, establishes and maintains the connection between multiple computers or applications on a computer.

8 0
3 years ago
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop compu
mel-nik [20]

Answer:

Interference of signal and the range between the user and the access point.

Explanation:

Elevators, specifically those with high voltage, are notoriously known for being a source of very strong magnetic fields. They produce a lot of harmonics that causes signal interference and noise. Whenever there is any kind of noise in a network, it causes huge intermittent connection. Also, the farther away the user is from the router or the AP, the weaker the signals and the more the intermittencies.  The user is recommended to be within the edges if the range limit.

3 0
3 years ago
Read 2 more answers
List 5 kinds of acquaintances who told Debbie Fields would fail?<br><br> right answer only
Mamont248 [21]
<span><span>1.her husband’s business acquaintances2.Debbi’s mother3.her in-laws4.her friends 5.fellow students at Los Altos Junior College </span>At age 20, Debbi Fields always loved baking cookies and decided that she thought about starting a business. Her family and friends argued that the business would fail but Debbi managed to get a loan. <span>
</span></span>
3 0
3 years ago
Read 2 more answers
As in previous prelabs, you can enter all the necessary Java code fragments into the DrJava Interactions pane. If you get an err
yuradex [85]

Answer:

public class Main{

public static void main(String[] args) {

 //The While Loop

 int i = 1;

 int sum = 0;

 while(i <=10){

     sum+=i;

     i++;  }

 System.out.println("Sum: "+sum);

 //The for Loop

 int summ = 0;

 for(int j = 1;j<=10;j++){

     summ+=j;  }

 System.out.println("Sum: "+summ); } }

Explanation:

The while loop begins here

 //The While Loop

This initializes the count variable i to 1

 int i = 1;

This initializes sum to 0

 int sum = 0;

This while iteration is repeated until the count variable i reaches 10

 while(i <=10){

This calculates the sum

     sum+=i;

This increments the count variable i by 1

     i++;  }

This prints the calculated sum

 System.out.println("Sum: "+sum);

The for loop begins here

 //The for Loop

This initializes sum to 0

 int summ = 0;

This iterates 1 through 10

 for(int j = 1;j<=10;j++){

This calculates the sum

     summ+=j;  }

This prints the calculated sum

 System.out.println("Sum: "+summ); }

5 0
2 years ago
Other questions:
  • True False The explicit location always tells you where users are located when they type the query.
    10·2 answers
  • Josie, your best friend, is having a huge Sweet Sixteen party. She has designated you to address all 100 of the envelopes (using
    7·1 answer
  • What is the operating system?
    9·1 answer
  • According to Holpp and Kelly's approaches to developing vision, the benchmarking approach is more internally focused, whereas th
    6·1 answer
  • Write a Python program to do the following:
    12·1 answer
  • Assume that an int variable counter has already been declared. Assume further a variable counterPointer of type "pointer to int"
    10·1 answer
  • In C++ write a program that prints out PI as a type double and a type float EXACTLY as shown below. Your program should have ONE
    13·1 answer
  • Question 4 1 pts The following code could be rewritten using: if (x &gt; 12): if (x &lt; 34):​
    8·1 answer
  • Which contact field is used to control the name that would appear in the To field of an email message when a user is sending a m
    5·2 answers
  • Thoughts on copyright?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!