How we ping ICMP a NIC with a correct IP address but with
wrong MAC address
Do all NIC's can run inpromiscuous mode
Answers were Sorted based on User's Feedback
Answer / prakash parmar
In computing, promiscuous mode or promisc mode is a
configuration of a network card that makes the card pass
all traffic it receives to the central processing unit
rather than just packets addressed to it — a feature
normally used for packet sniffing.
Each packet includes the hardware (Media Access Control)
address. When a network card receives a packet, it checks
if the address is its own. If not, the card normally drops
the packet. But in promiscuous mode, the card doesn't drop
the packet, thus allowing the computer to read all packets.
Is This Answer Correct ? | 6 Yes | 2 No |
Answer / abdullah
In computing, promiscuous mode or promisc mode is a
configuration of a network card that makes the card pass
all traffic it receives to the central processing unit
rather than just packets addressed to it — a feature
normally used for packet sniffing.
Each packet includes the hardware (Media Access Control)
address. When a network card receives a packet, it checks
if the address is its own. If not, the card normally drops
the packet. But in promiscuous mode, the card doesn't drop
the packet, thus allowing the computer to read all packets.
Is This Answer Correct ? | 5 Yes | 2 No |
Explain the difference between bus topology and hub?
Do we subletting of ip?
Mention what does the clock rate do?
Which command switches from User mode to Privileged mode? A.) login B.) privilege C.) admin D.) enable E.) enter F.) root
Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not a the same time
EIGRP send query reply & Acknowledgment on which address ?
Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM
Explain the difference between named and extended acl?
Identify 3 characteristics of a connection oriented protocol? A.) Path determination B.) Flow control C.) Acknowledgements D.) Uses hop count as metric E.) 3 step handshake
Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter
What is the size of ipv6?
My question is how windows pc will act as a router? Jitendra understand this question? I again want to ask you is it possibele for windows pc to act like a router