How we ping ICMP a NIC with a correct IP address but with
wrong MAC address
Do all NIC's can run inpromiscuous mode
Answers were Sorted based on User's Feedback
Answer / prakash parmar
In computing, promiscuous mode or promisc mode is a
configuration of a network card that makes the card pass
all traffic it receives to the central processing unit
rather than just packets addressed to it — a feature
normally used for packet sniffing.
Each packet includes the hardware (Media Access Control)
address. When a network card receives a packet, it checks
if the address is its own. If not, the card normally drops
the packet. But in promiscuous mode, the card doesn't drop
the packet, thus allowing the computer to read all packets.
| Is This Answer Correct ? | 6 Yes | 2 No |
Answer / abdullah
In computing, promiscuous mode or promisc mode is a
configuration of a network card that makes the card pass
all traffic it receives to the central processing unit
rather than just packets addressed to it — a feature
normally used for packet sniffing.
Each packet includes the hardware (Media Access Control)
address. When a network card receives a packet, it checks
if the address is its own. If not, the card normally drops
the packet. But in promiscuous mode, the card doesn't drop
the packet, thus allowing the computer to read all packets.
| Is This Answer Correct ? | 5 Yes | 2 No |
Identify the administrative distance and appropriate routing protocol? A.) RIP = 255, IGRP = 100 B.) RIP = 100, IGRP = 120 C.) RIP = 1, IGRP = 0 D.) RIP = 120, IGRP = 100
hi friends i have a problem.plz solve this. i am working some where and i have the number of swtitch.once my project manger says that we are going to exapnd our number of employ so plz attech an another switch.i asked to my jr network engineer that take a witch and implemnt on that n/w,as he implement the switch on that n/w.thats network get down, plz tell me what is the reason of that.
What are the possible ways of data exchange in ccna?
The benefits to segmenting with Bridges are which of the following? A.) Scalability B.) Datagram filtering C.) Manageability D.) Reliability
Which statement should you use to deny FTP access (only) from network 210 93 105 0 to network 223 8 151 0? A. access list 1 deny 210 93 105 0 0 0 0 0 any eq ftp access list 1 permit any B. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151 0 0 0 0 255 eq ftp C. access list 100 deny ip 223 8 151 0 0 0 0 255 any eq ftp access list 100 permit hp any any D. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151 0 0 0 0 255 eq ftp access list 100 permit ip any any
Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191 D.) 1 - 191
Explain the difference between igp and eigrp?
What are partial updates?
Identify the command to determine if an IP access-list is grouped on interface e0? A.) Router(config)# show ip interface e0 B.) Router> show ip interface e0 C.) Router# show interface e0 D.) Router# show ip interface e0
Mention what command you must use if you want to delete or remove the configuration data that is stored in the nvram?
which points are eliminated by the DBSCAN algorithm?
Identify the command to configure the IP address 172.16.100.5 255.255.255.0? A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0 B.) Router(config)# ip address 172.16.100.5 C.) Router# ip address 172.16.100.5 255.255.255.0 D.) Router(config)# ip address 172.16.100.5 255.255.255.0