In terms of computer security, a switch offers better security than a hub. Why is this?

a. A hub requires a special pin to activate the connection.
b. A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possible.
c. A switch forwards the data it receives to every device connected to the switch. It is possible for network devices to pick up data intended for a different device. A hub eliminates this by only forwarding data packets to the correct device whenever possible.
d. The use of the switch guarantees that all devices connected to it share link integrity pulses. This sharing of the pulses strengthens the security of the connection.

b. A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possible.

Computer Science & Information Technology

You might also like to view...

Which of the following network protocols is used to resolve FQDNs to IP addresses?

A. DNS B. FTP C. DHCP D. APIPA

Computer Science & Information Technology

In Isaac Asimov's series of robot stories, what were the laws that made up each of the robots' essential beings?

What will be an ideal response?

Computer Science & Information Technology