Eavesdropping on network data traffic can be minimized by using which of the following? (Select all that apply.)

a. Hubs
b. Switches
c. Ports
d. Gigabit networks


b. Switches

Computer Science & Information Technology

You might also like to view...

The ______ of a function take(s) information into the function from the calling program.

a. local variables b. input arguments c. output arguments d. prototype e. purpose

Computer Science & Information Technology

A __________ configuration is a current record of the configuration of the information system for use in comparisons to future states.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To add a row to your view, simply add a row to each underlying derived table.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When using _____ insertion, we insert the nodes at the end of the sibling list, much as we insert a new node at the rear of a queue.

A. FIFO B. LIFO C. key-sequenced D. random

Computer Science & Information Technology