which scenario are an AIC engine and the Application Policy Enforcement feature needed?

In which scenario are an AIC engine and the Application Policy Enforcement feature needed?

In which scenario are an AIC engine and the Application Policy Enforcement feature needed?

A.
You think users on your network are disguising the use of file-sharing applications by tunneling
the traffic through port 80. You want your sensor to identify and stop this activity.

B.
You have been experiencing attacks on your voice gateways. You want to implement advanced
VoIP protection.

C.
You believe that hackers are evading the Cisco IPS. You want the sensor to eradicate
anomalies in the IP and TCP layers that allow an IPS to be evaded.

D.
You think some users with operator privileges have been misusing their privileges. You want
the sensor to detect this activity and revoke authentication privileges.



Leave a Reply 0

Your email address will not be published. Required fields are marked *