ExamGecko
Question list
Search
Search

Related questions











Question 124 - 200-201 discussion

Report
Export

What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?

A.

Tapping interrogation replicates signals to a separate port for analyzing traffic

Answers
A.

Tapping interrogation replicates signals to a separate port for analyzing traffic

B.

Tapping interrogations detect and block malicious traffic

Answers
B.

Tapping interrogations detect and block malicious traffic

C.

Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies

Answers
C.

Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies

D.

Inline interrogation detects malicious traffic but does not block the traffic

Answers
D.

Inline interrogation detects malicious traffic but does not block the traffic

Suggested answer: A

Explanation:

Traffic tapping involves replicating network traffic and sending it to a separate port where it can be analyzed without affecting the original traffic flow. This allows security analysts to monitor and analyze traffic for potential threats without the risk of blocking legitimate traffic.

asked 07/10/2024
Kingsley Tibs
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first