Certified Ethical Hacker (CEH) Practice Question

During an internal penetration test you attach your laptop to an access switch and simply enable promiscuous mode on its NIC, hoping to view other employees' unicast traffic. You quickly notice that only broadcast and your own frames appear in Wireshark. Which statement best explains this behavior and how you could still capture other hosts' traffic without physical re-cabling the switch?

  • A switch blocks software sniffers entirely; only installing an in-line fiber tap enables passive capture, while ARP spoofing provides no advantage.

  • Because switches send unicast frames only to the correct port, passive sniffing sees just broadcast and local traffic; launching an ARP-poisoning or MAC-flooding attack can trick the switch into forwarding a victim's frames to the sniffer.

  • Passive sniffing fails on switches because they encrypt traffic; configuring the NIC for jumbo frames would allow interception of all unicast packets.

  • Passive sniffing is effective on a switched network as long as the sniffer's interface runs in full-duplex mode; no additional attacks are required.

Certified Ethical Hacker (CEH)
Network and Perimeter Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot