What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?

Posted by: Pdfprep Category: 200-201 Tags: , ,

What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
A . Tapping interrogation replicates signals to a separate port for analyzing traffic
B . Tapping interrogations detect and block malicious traffic
C . Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
D . Inline interrogation detects malicious traffic but does not block the traffic

Answer: A

Leave a Reply

Your email address will not be published.