PdfPrep.com

How do traffic interrogation applications function when inline?

How do traffic interrogation applications function when inline?
A . They ingest the traffic as it passes through the device and inspect it in real time
B . They create a copy of the packet and send it off to be analyzed by an IDS or IPS
C . They utilize header information passed to it from mirrored ports
D . They passively “sniff” the wire to look for signatures

Answer: A

Exit mobile version