Posted by: Pdfprep
Post Date: October 27, 2020
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
A . Tapping interrogation replicates signals to a separate port for analyzing traffic
B . Tapping interrogations detect and block malicious traffic
C . Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
D . Inline interrogation detects malicious traffic but does not block the traffic
Answer: A
Leave a Reply