Posted by: Pdfprep
Post Date: November 3, 2020
How do traffic interrogation applications function when inline?
A . They ingest the traffic as it passes through the device and inspect it in real time
B . They create a copy of the packet and send it off to be analyzed by an IDS or IPS
C . They utilize header information passed to it from mirrored ports
D . They passively “sniff” the wire to look for signatures
Answer: A
Leave a Reply