Which two of these characteristics apply to promiscuous IPS operation?

Which two of these characteristics apply to promiscuous IPS operation? (Choose two.)

Which two of these characteristics apply to promiscuous IPS operation? (Choose two.)

A.
Invisible to the attacker

B.
Impacts connectivity in case of failure or overload

C.
Increase latency

D.
Can use stream normalization techniques

E.
Typically used with SPAN on the Switches

F.
Less vulnerable to evasion techniques than inline mode



Leave a Reply 0

Your email address will not be published. Required fields are marked *