What is the correct deployment for an IPS appliance in a network where traffic identified as threat
traffic should be blocked and all traffic is blocked if the IPS fails? 
A.
 Inline; fail open
B.
 Inline; fail closed
C.
 Promiscuous; fail open
D.
 Promiscuous; fail closed