The company security policy led to the installation of a NIPS in front of the Internet firewall and in front of the DMZ network. With this placement, which of the following can be done?

A. Perform fingerprinting of all unfiltered inbound traffic.
B. Monitor inbound traffic to the DMZ.
C. Monitor outbound traffic to the DMZ.
D. All of the above


D
Explanation: By positioning the NIPS between the Internet and both the DMZ and the Internet firewall, you will get traffic inbound from the Internet before it goes though the firewall so it will be unfiltered and you will be able to track both incoming and outgoing traffic to the DMZ.

Computer Science & Information Technology

You might also like to view...

If you are referring to a percentage that does not change in a formula, you should use a(n) ________ reference

A) relative B) normal C) mixed D) absolute

Computer Science & Information Technology

To add a custom field to a query, you should click on the first empty ________ in the design grid

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following refers to a successful attempt to compromise a system's security?

A. discovery B. exploit C. break-in D. gateway

Computer Science & Information Technology

? ?A task that represents several activities is known as a _____.

A. ?task group B. ?task name C. ?task  review D. ?task  ID

Computer Science & Information Technology