Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)
A.
Modifying packets
B.
Requesting connection blocking
C.
Denying packets
D.
Resetting the TCP connection
E.
Requesting host blocking
F.
Denying frames
Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)
Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)
A.
Modifying packets
B.
Requesting connection blocking
C.
Denying packets
D.
Resetting the TCP connection
E.
Requesting host blocking
F.
Denying frames