Exhibit:
You work as a network administrator at YourDomain.com. You carefully study the exhibit. Given this network design, which command would you use to configure traffic capture on the IDSM?
A.
Monitor session 1 source vlan 20
B.
Intrusion-detection module 5 data-port 1 access-vlan 10
C.
Monitor session 1 source vlan 10
D.
Intrusion-detection module 5 data-port 1 access-vlan 20