In terms of computer security, a switch offers better security than a hub. Why is this?

a. A hub requires a special pin to activate the connection.
b. A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possible.
c. A switch forwards the data it receives to every device connected to the switch. It is possible for network devices to pick up data intended for a different device. A hub eliminates this by only forwarding data packets to the correct device whenever possible.
d. The use of the switch guarantees that all devices connected to it share link integrity pulses. This sharing of the pulses strengthens the security of the connection.


b. A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possible.

Computer Science & Information Technology

You might also like to view...

Consider the Collection interface in the java.util package, which is the ancestor of both List and Set. Write preconditions and postconditions for the operations below and modify the constraints you wrote in exercises 9-1 and 9–2, knowing that contracts are inherited. Make sure you comply with the Liskov Substitution Principle.

a. int size() returns the number of elements in the collection. b. void add(Object e) adds an object to the collection. c. void remove(Object e) removes an object from the collection. d. boolean contains(Object e) returns true if the object is in the collection.

Computer Science & Information Technology

____ are used when an action might need to be taken multiple times.

A. Sequence structures B. Repetition structures C. Selection structures D. Modules and functions

Computer Science & Information Technology

Another word for an input changing value in the Scenario Manager is a(n) ____.

A. analysis B. tracker C. result D. variable

Computer Science & Information Technology

Matt, a system administrator, wants to establish a nightly available SQL database. Which of the following would be implemented to eliminate a single point of failure in storage and servers?

A. RAID 5 and a storage area network B. Two striped drives and clustering C. Two mirrored drives and clustering D. RAID 0 and load balancing

Computer Science & Information Technology