Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.

Fill in the blank(s) with the appropriate word(s).


promiscuous

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. Any software that intentionally does harm to computers A. dual core II. Data handling capacity of a PC dealing with data group size B. malware III. Program that records your keystrokes or looks at your hard drive C. architecture IV. A benchmark that measures overall CPU performance D. spyware V. Processor type that has two separate CPU units E. P-rating

Computer Science & Information Technology

In the Reviewing task pane in Word you can locate additional information about your topic

Indicate whether the statement is true or false

Computer Science & Information Technology

A ________ chart is a diagram that represents an algorithm or process

a. Flow b. Pseudo c. Score d. Gantt

Computer Science & Information Technology

When you finish writing the abstract class, what must the subclasses do to use it?

A. reference the abstract class in their __init__ method. B. copy the code to the subclass file C. nothing, the abstract class is automatically included in the subclass D. import the abstract class

Computer Science & Information Technology