What three statements about logging are true?
What does the Host Watch List monitor?
Which three actions can be taken on a rule when deployed in inline mode?
What is the function of the Log Packets notification action?
What are two drawbacks of an IDS system blocking an IP address?
What is the process for enabling packet logging?
Which three functions can the IDP Sensor perform?
What are the limitations of using TCP Reset to block connections in an IDS?
Which IDP Sensors support High-Availability?
Which two attack detection methods are unique to Juniper NetScreenIDP?