Given this network design, which command would you use to configure traffic capture on the IDSM?

Exhibit:

You work as a network administrator at YourDomain.com. You carefully study the exhibit. Given this network design, which command would you use to configure traffic capture on the IDSM?

Exhibit:

You work as a network administrator at YourDomain.com. You carefully study the exhibit. Given this network design, which command would you use to configure traffic capture on the IDSM?

A.
monitor session 1 source vlan 20

B.
intrusion-detection module 5 data-port 1 access-vlan 20

C.
monitor session 1 source vlan 10

D.
intrusion-detection module 5 data-port 1 access-vlan 30



Leave a Reply 0

Your email address will not be published. Required fields are marked *