What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
A . Tapping interrogation replicates signals to a separate port for analyzing traffic
B . Tapping interrogations detect and block malicious traffic
C . Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
D . Inline interrogation detects malicious traffic but does not block the traffic
Answer: A
Latest 200-201 Dumps Valid Version with 154 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
                             Subscribe
                            
                        
                                            
                             Login                        
                    
                        0 Comments                    
                                        
                     Inline Feedbacks                    
                    View all comments
                 
	