Of the following, which would be the best configuration to protect from a traffic hijack attempt?

You need to verify the effectiveness of your IPS configuration for your Web server farm. You have a colleague run penetration tests to confirm that the Web servers are secure against traffic hijacks. Of the following, which would be the best configuration to protect from a traffic hijack attempt?

You need to verify the effectiveness of your IPS configuration for your Web server farm. You have a colleague run penetration tests to confirm that the Web servers are secure against traffic hijacks. Of the following, which would be the best configuration to protect from a traffic hijack attempt?

A.
Enable the Web intelligence > SQL injection setting.

B.
Activate the Cross-Site Scripting property.

C.
Configure TCP defenses such as Small PMTU size.

D.
Create resource objects for the Web farm servers and configure rules for the Web farm.



Leave a Reply 0

Your email address will not be published. Required fields are marked *