Which two of these characteristics apply to promiscuous IPS operation? (Choose two.)
A.
typically used with SPAN on the switches
B.
impacts connectivity in case of failure or overload
C.
invisible to the attacker
D.
increases latency
E.
can use stream normalization techniques
F.
less vulnerable to evasion techniques than inline mode