The company security policy led to the installation of a NIPS in front of the Internet firewall and in front of the DMZ network. With this placement, which of the following can be done?
A. Perform fingerprinting of all unfiltered inbound traffic.
B. Monitor inbound traffic to the DMZ.
C. Monitor outbound traffic to the DMZ.
D. All of the above
D
Explanation: By positioning the NIPS between the Internet and both the DMZ and the Internet firewall, you will get traffic inbound from the Internet before it goes though the firewall so it will be unfiltered and you will be able to track both incoming and outgoing traffic to the DMZ.
You might also like to view...
If you are referring to a percentage that does not change in a formula, you should use a(n) ________ reference
A) relative B) normal C) mixed D) absolute
To add a custom field to a query, you should click on the first empty ________ in the design grid
Fill in the blank(s) with correct word
Which of the following refers to a successful attempt to compromise a system's security?
A. discovery B. exploit C. break-in D. gateway
?
?A task that represents several activities is known as a _____.
A. ?task group B. ?task name C. ?task review D. ?task ID