Eavesdropping on network data traffic can be minimized by using which of the following? (Select all that apply.)
a. Hubs
b. Switches
c. Ports
d. Gigabit networks
b. Switches
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a contract distributed with a program that gives you the right to install and use the program on one or more computers
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which metric is the most user centric in a timesharing environment?
What will be an ideal response?
Computer Science & Information Technology