What sort of application might require the promiscuous mode security policy to be configured to "accept" in order to support?
A. A web server with multiple virtual host configurations.
B. An e-mail server that utilizes load balancing features.
C. A clustered application that shares its IP address with other instances.
D. A network monitoring application such as an intrusion detection system (IDS).
Answer: D
Computer Science & Information Technology
You might also like to view...
The default size limit for files in Office 365 is 50 MB
Indicate whether the statement is true or false
Computer Science & Information Technology
Table, form, and report objects in the database can have the same name.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology