Network behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.

A. inline
B. offline
C. passive
D. bypass


Answer: A

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. User stories in agile development are on spoken interaction between developers and users, not on written communication. 2. Analysts can best reflect all of the four values of agile modeling through an attitude of humility. 3. The word agile in agile modeling implies maneuverability. 4. Pair programming means that ownership of the design or software itself is shared as in a partnership.

Computer Science & Information Technology

What is a digital signature and for what purpose is one used?

What will be an ideal response?

Computer Science & Information Technology

The ________ performs arithmetic and logic operations

Fill in the blank(s) with correct word

Computer Science & Information Technology

Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this evidence, and how the evidence was secured while it was in your possession, is know by what term?

A. evidence security roster B. chain of custody C. item inventory D. evidence tracking list

Computer Science & Information Technology