Eavesdropping on network data traffic can be minimized by using which of the following? (Select all that apply.)

a. Hubs
b. Switches
c. Ports
d. Gigabit networks

b. Switches

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a contract distributed with a program that gives you the right to install and use the program on one or more computers

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which metric is the most user centric in a timesharing environment?

What will be an ideal response?

Computer Science & Information Technology