Exam 200-201 | Question id=6115 | Network intrusion analysis |
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
A. |
Tapping interrogation replicates signals to a separate port for analyzing traffic | |
B. |
Tapping interrogations detect and block malicious traffic | |
C. |
Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies | |
D. |
Inline interrogation detects malicious traffic but does not block the traffic |