Which rule base would detect the use of nmap on a network?
Which type of cable do you use for a console connection to an IDP sensor?
Which statement is true regarding IDP rule matching on a sensor?
Which TCP port is used for communication between Security Manager and an IDP sensor?
which policy is installed, and mode of sensor deployment?
Which statement is true about packet capture in the IDP sensor?
Which statement about the Enterprise Security Profiler (ESP) is true?
What is one use of an IP action?
What must you do before the new attack objects become active on the IDP sensors?
which SYN protector mode is the IDP using?