DRAG AND DROP…

DRAG AND DROP

DRAG AND DROP

Answer:

Explanation:
Can stop the attack trigger packet IPS
No network impact if there is a sensor overload IDS
Allows malicious traffic to pass before it can respond IDS
Deployed in promiscuous mode IDS
Can use stream normalization techniques IPS
More vulnerable to network evasion techniques IDS
Has some impact on network latency and jitter IPS
Deployed in inline mode – IPS



Leave a Reply 0

Your email address will not be published. Required fields are marked *

15 − 12 =