How do traffic interrogation applications function when inline?

Posted by: Pdfprep Category: 210-250 Tags: , ,

How do traffic interrogation applications function when inline?
A . They ingest the traffic as it passes through the device and inspect it in real time
B . They create a copy of the packet and send it off to be analyzed by an IDS or IPS
C . They utilize header information passed to it from mirrored ports
D . They passively “sniff” the wire to look for signatures

Answer: A

Leave a Reply

Your email address will not be published.