Which two of these characteristics apply to promiscuous IPS operation?

Which two of these characteristics apply to promiscuous IPS operation? (Choose two.)

Which two of these characteristics apply to promiscuous IPS operation? (Choose two.)

A.
typically used with SPAN on the switches

B.
impacts connectivity in case of failure or overload

C.
invisible to the attacker

D.
increases latency

E.
can use stream normalization techniques

F.
less vulnerable to evasion techniques than inline mode



Leave a Reply 0

Your email address will not be published. Required fields are marked *