1. Which of the following appliance types is used to monitor networks for intrusion and malicious network activity?
d. VPN concentrators
2. The actions taken by a device in a promiscuous mode include sending alerts, alarms, log messages, or SNMP traps (true or false).
3. Which of the following intrusion prevention and detection devices are placed inline with the traffic?
4. Which of the following are valid IPS and IDS types (choose all that . . .
The content below this message is for members only.