Given this network design, which command would you use to configure traffic capture on the IDSM?

Exhibit:

You work as a network administrator at YourDomain.com. You carefully study the exhibit. Given this network design, which command would you use to configure traffic capture on the IDSM?

Exhibit:

You work as a network administrator at YourDomain.com. You carefully study the exhibit. Given this network design, which command would you use to configure traffic capture on the IDSM?

A.
Monitor session 1 source vlan 20

B.
Intrusion-detection module 5 data-port 1 access-vlan 10

C.
Monitor session 1 source vlan 10

D.
Intrusion-detection module 5 data-port 1 access-vlan 20



Leave a Reply 0

Your email address will not be published. Required fields are marked *