Most NBA sensors can be deployed in ____ mode only, using the same connection methods (e.g., network tap, switch spanning port) as network-based IDPSs.

A. simple
B. aggressive
C. active
D. passive


Answer: D

Computer Science & Information Technology

You might also like to view...

What command is used to find out the version of the IOS running on a Cisco router? Show the prompt and the command.

What will be an ideal response?

Computer Science & Information Technology

Suppose the link between routers 1 and 2 is down in the Internet shown in Figure 8-1 on page 289. What happens if someone at site C sends a message to a user on a workstation attached to the Ethernet cable at site A? What happens if the router at site A is down? What does this tell you about design- ing network configurations?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is the largest?

A) gigabyte B) megabyte C) petabyte D) terabyte

Computer Science & Information Technology

A(n) _________ is a private, secure path across a public network that is set up to allow authorized users private, secure access to a network. A. virtual private network (VPN) B. local private network (LPN) C. managed private network (MPN) D. web private network (WPN)

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology