You think users on your corporate network are disguising the use of file-sharing applications by
tunneling the traffic through port 80. How can you configure your Cisco IPS Sensor to identify and
stop this activity?
A.
Enable all signatures in the Service HTTP engine. Then create an event action override that
adds the Deny Packet Inline action to events triggered by these signatures if the traffic originates
from your corporate network.
B.
Enable both the HTTP application policy and the alarm on non-HTTP traffic signature.
C.
Assign the Deny Packet Inline action to all signatures in the Service HTTP engine.
D.
Enable the alarm for the non-HTTP traffic signature. Then create an Event Action Override that
adds the Deny Packet Inline action to events triggered by the signature if the traffic originates from
your corporate network.
E.
Enable all signatures in the Service HTTP engine.