From a security standpoint, how do switches increase the relative protection of networking communications?
What will be an ideal response?
By creating a point-to-point connection between two stations, the switch prevents other nodes from eavesdropping on the digital conversation. This prevents the average user from running a packet sniffer program and listening in on a coworker's data communications. From a network administration standpoint, where using a packet sniffer is not only legal but advisable (to detect anomalous network performance), most switches have a monitoring port, which operates in"promiscuous mode"and allows the administrator to review all networking traffic.
You might also like to view...
Delete (unset) the variable called Number
What will be an ideal response?
What is the job of the compiler? What does the linker do? Describe the differences between a compile error and a link error.
What will be an ideal response?
COGNITIVE ASSESSMENT What can you use if the computer cannot start from its boot disk?
A. recovery media B. system media C. configuration media D. backup media
Which of the following network topologies is ONLY possible between two users?
A. Star B. Client-server C. Hybrid D. Peer-to-peer