What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
A) Tapping interrogation replicates signals to a separate port for analyzing traffic
B) Tapping interrogations detect and block malicious traffic
C) Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
D) Inline interrogation detects malicious traffic but does not block the traffic
Correct Answer:
Verified
Q69: Which open-sourced packet capture tool uses Linux
Q70: Which two elements are assets in the
Q71: Which utility blocks a host portscan?
A) HIDS
B)
Q72: Q73: Which category relates to improper use or Q75: What is personally identifiable information that must Q76: What is rule-based detection when compared to Q77: An investigator is examining a copy of Q78: How is attacking a vulnerability categorized? Q79: Which type of evidence supports a theory
A) action
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents