Which IPS response to an attack can do the most damage?
A. limiting suspicious traffic to a certain percentage of the total bandwidth and dropping packets
B. limiting suspicious traffic to a certain percentage of the total bandwidth
C. None of the options
D. Dropping packets
D. Dropping packets
You might also like to view...
All applications must run under the direction of an operating system
Indicate whether the statement is true or false
To change the background, you use the _____ Background task pane.
A. Review B. Design C. Format D. Insert
In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?
a. The hosts that share the same MAC addresses will be completely unable to communicate with any other devices. b. The hosts will generate new MAC addresses until the conflict is resolved. c. The hosts will still send and receive traffic, but traffic may not always reach the correct destination. d. The network switch will eventually crash due to being unable to properly forward traffic.
Which of the following best describes an intrusion prevention system?
A) Passive device that analyzes network traffic to detect unauthorized access B) Active device that sits inline with traffic flow and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content C) A software or hardware device that can filter incoming or outgoing traffic based on specific rules D) A device that monitors the characteristics of a single host and the events occurring on that host