How we ping ICMP a NIC with a correct IP address but with
wrong MAC address
Do all NIC's can run inpromiscuous mode
Answers were Sorted based on User's Feedback
Answer / prakash parmar
In computing, promiscuous mode or promisc mode is a
configuration of a network card that makes the card pass
all traffic it receives to the central processing unit
rather than just packets addressed to it — a feature
normally used for packet sniffing.
Each packet includes the hardware (Media Access Control)
address. When a network card receives a packet, it checks
if the address is its own. If not, the card normally drops
the packet. But in promiscuous mode, the card doesn't drop
the packet, thus allowing the computer to read all packets.
| Is This Answer Correct ? | 6 Yes | 2 No |
Answer / abdullah
In computing, promiscuous mode or promisc mode is a
configuration of a network card that makes the card pass
all traffic it receives to the central processing unit
rather than just packets addressed to it — a feature
normally used for packet sniffing.
Each packet includes the hardware (Media Access Control)
address. When a network card receives a packet, it checks
if the address is its own. If not, the card normally drops
the packet. But in promiscuous mode, the card doesn't drop
the packet, thus allowing the computer to read all packets.
| Is This Answer Correct ? | 5 Yes | 2 No |
What is the size of hello packets in eigrep protocol?
What three occurrences will reset the holddown timer after a triggered update? A.) Infinity is finally defined as some max number B.) HD Timer expires C.) Another update is received indicating a better metric D.) The router receives a processing task proportional to the number of links in the internetwork E.) The router detects fault LSP's propagating through the internetwork F.) Another update is received indicating net status changed
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
Which two statements are true? (Choose two) A. Ethernet 802.3 utilizes a half duplex method for data transfer B. In a 100 MBS point to point connection a full duplex connection can provide 400 Mbs of data transfer C. Ethernet switches can use the full duplex mode to connect multiple nodes on a single pod of a switch D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception
What is difference between fast ethernet and ethernet port?
13 Answers Bank of Baroda, Bank Of India,
Define class full protocol?
Can you explain transport and tunnel mode in detail with datagram packets?
hello sir , if i finish this certification is the job is conform ?? and in chennai were i can do this ??
What is the size of ipv6?
hi... i am a beginner to CCNA... i find it hard understandin collision domain n broadcast domain.. please don tell me the definition.. i read the definitions many times... i need a more detailed explanation... like whn i read the definition it sounds simple... but i don understand whn they say it like a hub has one collision domain and one broadcast domain... and if collisions happen inside collision domain... i am confused... please help me... :(
On which layer does L2F, PPTP and L2TP operate?
What are the protocols that are used by every layer of ip/tcp model?