What Event Action in an IPS signature is used to stop an attacker from communicating with a
network using an access-list?
A.
Request Block Host
B.
Deny Attacker Inline
C.
Deny Connection Inline
D.
Deny Packet Inline
E.
Request Block Connection
What Event Action in an IPS signature is used to stop an attacker from communicating with a
network using an access-list?
What Event Action in an IPS signature is used to stop an attacker from communicating with a
network using an access-list?
A.
Request Block Host
B.
Deny Attacker Inline
C.
Deny Connection Inline
D.
Deny Packet Inline
E.
Request Block Connection