How we ping ICMP a NIC with a correct IP address but with
wrong MAC address
Do all NIC's can run inpromiscuous mode

Answers were Sorted based on User's Feedback



How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can ..

Answer / prakash parmar

In computing, promiscuous mode or promisc mode is a
configuration of a network card that makes the card pass
all traffic it receives to the central processing unit
rather than just packets addressed to it — a feature
normally used for packet sniffing.

Each packet includes the hardware (Media Access Control)
address. When a network card receives a packet, it checks
if the address is its own. If not, the card normally drops
the packet. But in promiscuous mode, the card doesn't drop
the packet, thus allowing the computer to read all packets.

Is This Answer Correct ?    6 Yes 2 No

How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can ..

Answer / asim

Thanks abdullah and prakash,
plz read my question carefully ur answers are not relevant acco

Is This Answer Correct ?    4 Yes 0 No

How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can ..

Answer / abdullah

In computing, promiscuous mode or promisc mode is a
configuration of a network card that makes the card pass
all traffic it receives to the central processing unit
rather than just packets addressed to it — a feature
normally used for packet sniffing.

Each packet includes the hardware (Media Access Control)
address. When a network card receives a packet, it checks
if the address is its own. If not, the card normally drops
the packet. But in promiscuous mode, the card doesn't drop
the packet, thus allowing the computer to read all packets.

Is This Answer Correct ?    5 Yes 2 No

Post New Answer

More CCNA Interview Questions

Explain the difference between bus topology and hub?

0 Answers  


Do we subletting of ip?

0 Answers  


Mention what does the clock rate do?

0 Answers  


Which command switches from User mode to Privileged mode? A.) login B.) privilege C.) admin D.) enable E.) enter F.) root

5 Answers  


Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not a the same time

2 Answers  






EIGRP send query reply & Acknowledgment on which address ?

3 Answers  


Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM

1 Answers  


Explain the difference between named and extended acl?

0 Answers  


Identify 3 characteristics of a connection oriented protocol? A.) Path determination B.) Flow control C.) Acknowledgements D.) Uses hop count as metric E.) 3 step handshake

2 Answers  


Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter

1 Answers  


What is the size of ipv6?

0 Answers  


My question is how windows pc will act as a router? Jitendra understand this question? I again want to ask you is it possibele for windows pc to act like a router

2 Answers  


Categories