You need to configure IPS in order to protect your network against traffic hijack attempts. Which of the following will you configure?
A.
Cross-Site Scripting
B.
Directory Traversal
C.
Command Injection
D.
SQL Injection
E.
LDAP Injection
You need to configure IPS in order to protect your network against traffic hijack attempts. Which of the following will you configure?
A.
Cross-Site Scripting
B.
Directory Traversal
C.
Command Injection
D.
SQL Injection
E.
LDAP Injection