Network behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.

A. inline
B. offline
C. passive
D. bypass

Answer: A

Computer Science & Information Technology

You might also like to view...

Which aggregate function would be used to find the least valued item in a column?

A) MINIMUM B) LEAST C) LOWEST D) COUNT

Computer Science & Information Technology

Text in bulleted lists in a PowerPoint presentation is based on an outline in which the bullets are assigned to different outline levels

Indicate whether the statement is true or false

Computer Science & Information Technology