header bg

Scan QR code or get instant email to install app


(Select all that apply) Which of the following statements are true?
An attacker attached a laptop to a switch port and activated a sniffer. The NIC is set to promiscuous mode, and the laptop is left alone for a few hours to collect information.

A The packet capture will provide the MAC addresses of other machines connected to the switch.

Switches filter or flood traffic based on the address. Broadcast traffic, such as ARP requests and answers, is flooded to all ports. Unicast traffic, such as traffic intended for the laptop itself or the default gateway, is sent only to the port on which the machine rests.

Related Information


Leave a Reply

Your email address will not be published. Required fields are marked *