Which steps must you perform?

Assume that Enterprise Security Profiler (ESP) has already captured data for your network. You want
to view traffic that does not match the following protocols: HTTP,
HTTPS, DNS. Which steps must you perform?

Assume that Enterprise Security Profiler (ESP) has already captured data for your network. You want
to view traffic that does not match the following protocols: HTTP,
HTTPS, DNS. Which steps must you perform?

A.
Under the Violation Viewer tab, create a permitted object, select that object, and then click Apply.

B.
Under the Violation Viewer tab, create a filter to show only tracked hosts.

C.
Under the Violation Viewer tab, create a violation object, select that object, and then click Apply.

D.
Under the Application View tab, create a permitted object, select that object, and then click
Apply.



Leave a Reply 0

Your email address will not be published. Required fields are marked *