What is the correct deployment for an IPS appliance in a network where traffic identified as threat
traffic should be blocked and all traffic is blocked if the IPS fails?
A.
Inline; fail open
B.
Inline; fail closed
C.
Promiscuous; fail open
D.
Promiscuous; fail closed