You need to verify the effectiveness of your IPS configuration for your Web server farm. You have
a colleague run penetration tests to confirm that the Web servers are secure against traffic hijacks.
Of the following, which would be the best configuration to protect from a traffic hijack attempt?
A.
Create resource objects for the Web farm servers and configure rules for the Web farm.
B.
Enable the Web intelligence > SQL injection setting.
C.
Configure TCP defenses such as Small PMTU size.
D.
Activate the Cross-Site Scripting property.