Which of the following does proper basic configuration of snort as a network intrusion detection system require?

Which of the following does proper basic configuration of snort as a network intrusion detection
system require?

Which of the following does proper basic configuration of snort as a network intrusion detection
system require?

A.
Limit the packets captured to the snort configuration file.

B.
Capture every packet on the network segment.

C.
Limit the packets captured to a single segment.

D.
Limit the packets captured to the /var/log/snort directory.



Leave a Reply 1

Your email address will not be published. Required fields are marked *