What are the three most effect methods for counteracting eavesdropping?
Answer: (1) Using switched networks instead of hubs (2) Using encryption that meets the data security needs (3) Forbidding the use of protocols with known susceptibilities to eavesdropping?
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.