Which of the following does proper basic configuration of snort as a network intrusion detection
system require?
A.
Limit the packets captured to the snort configuration file.
B.
Capture every packet on the network segment.
C.
Limit the packets captured to a single segment.
D.
Limit the packets captured to the /var/log/snort directory.
A