Refer to the exhibit. Given this network design, which command would you use to configure traffic
capture on the IDSM?
Exhibit:
A.
monitor session 1 source vlan 10
B.
monitor session 1 sourcevlan 20
C.
intrusion-detection module 5 data-port 1 access-vlan 10
D.
intrusion-detection module 5 data-port 1 access-vlan 20