List of questions
Related questions
Question 382 - 712-50 discussion
As the Chief Information Security Officer, you are performing an assessment of security posture to understand what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows to detect and actively stop vulnerability exploits and attacks?
A.
Gigamon
B.
Intrusion Prevention System
C.
Port Security
D.
Anti-virus
Your answer:
0 comments
Sorted by
Leave a comment first