(Select all that apply) Which of the following statements are true?
An attacker attached a laptop to a switch port and activated a sniffer. The NIC is set to promiscuous mode, and the laptop is left alone for a few hours to collect information.
The packet capture will provide the MAC addresses of other machines connected to the switch.
Switches filter or flood traffic based on the address. Broadcast traffic, such as ARP requests and answers, is flooded to all ports. Unicast traffic, such as traffic intended for the laptop itself or the default gateway, is sent only to the port on which the machine rests.
Take more free practice tests for other ASVAB topics with our ceh training