What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
A . Tapping interrogation replicates signals to a separate port for analyzing traffic
B . Tapping interrogations detect and block malicious traffic
C . Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
D . Inline interrogation detects malicious traffic but does not block the traffic
Answer: A
Latest 200-201 Dumps Valid Version with 154 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments