A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capture all of the network traffic. Which of the following should be used for the IDS implementation?
A) Network tap
B) Honeypot
C) Aggregation
D) Port mirror
Correct Answer:
Verified
Q467: Which of the following documents would provide
Q468: A government organization recently contacted three different
Q469: The Chief Information Officer (CIO) has determined
Q470: An organization needs to integrate with a
Q471: A healthcare company is revamping its IT
Q473: An organization is building a new customer
Q474: A technician is investigating a report of
Q475: A Chief Information Security Officer (CISO) for
Q476: An attacker has obtained the user ID
Q477: A company is examining possible locations for
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents