Network behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.
A. inline
B. offline
C. passive
D. bypass
Answer: A
Computer Science & Information Technology
You might also like to view...
Which aggregate function would be used to find the least valued item in a column?
A) MINIMUM B) LEAST C) LOWEST D) COUNT
Computer Science & Information Technology
Text in bulleted lists in a PowerPoint presentation is based on an outline in which the bullets are assigned to different outline levels
Indicate whether the statement is true or false
Computer Science & Information Technology