Which two of these characteristics apply to promiscuous IPS operation? (Choose two.)
A.
Invisible to the attacker
B.
Impacts connectivity in case of failure or overload
C.
Increase latency
D.
Can use stream normalization techniques
E.
Typically used with SPAN on the Switches
F.
Less vulnerable to evasion techniques than inline mode