What sort of application might require the promiscuous mode security policy to be configured to "accept" in order to support?

A. A web server with multiple virtual host configurations.
B. An e-mail server that utilizes load balancing features.
C. A clustered application that shares its IP address with other instances.
D. A network monitoring application such as an intrusion detection system (IDS).

Answer: D

Computer Science & Information Technology

You might also like to view...

The default size limit for files in Office 365 is 50 MB

Indicate whether the statement is true or false

Computer Science & Information Technology

Table, form, and report objects in the database can have the same name.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology