Your company enforces a strict change control policy. Which of the following would be MOST
effective for quickly dropping an attacker’s specific active connection?
A.
Intrusion Detection System (IDS) Policy install
B.
SAM – Suspicious Activity Rules feature of SmartView Monitor
C.
Block Intruder feature of SmartView Tracker
D.
Change the Rule Base and install the Policy to all Security Gateways
Explanation: