The company security policy led to the installation of a NIPS in front of the Internet firewall and in front of the DMZ network. With this placement, which of the following can be done?
A. Perform fingerprinting of all unfiltered inbound traffic.
B. Monitor inbound traffic to the DMZ.
C. Monitor outbound traffic to the DMZ.
D. All of the above
D
Explanation: By positioning the NIPS between the Internet and both the DMZ and the Internet firewall, you will get traffic inbound from the Internet before it goes though the firewall so it will be unfiltered and you will be able to track both incoming and outgoing traffic to the DMZ.
Computer Science & Information Technology
You might also like to view...
The binding of a data object to a value after a program terminates is called ______.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
You almost always code at least one catch block immediately following a(n) ____________________ block.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology