If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?

A. interface capture
B. port identity
C. port snooping
D. port mirroring


Answer: D

Computer Science & Information Technology

You might also like to view...

A programming approach in which you solve a "big" problem by (1) breaking it into "small" problems, (2) solving each "small" problem, and (3) combining the "small" problem solutions into a solution is known as ____.

A. code refactoring B. drilling down C. track and test D. divide and conquer

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A partially filled array is normally accompanied by an integer variable that indicates the number of items actually stored in the array. 2. A search algorithm is a technique for scanning through an array and rearranging its contents in some specific order. 3. It is critical to use reference parameters in any method that must be able to change the values of the items passed to it as arguments. 4. The primary advantage of the binary search algorithm is simplicity, but its primary disadvantage, however, is inefficiency. 5. A two-dimensional array can be thought of as having rows and columns of elements.

Computer Science & Information Technology

A ________ file preserves a document's layout and formatting and can be opened in several different applications

Fill in the blank(s) with correct word

Computer Science & Information Technology

When searching and sorting data stored on a computer, comparisons can be made using character strings.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology