A.DDoS signatures B.strong signatures C.exploit signatures D.numeric signatures E.spoofing signatures F.connection signatures
A.The IPS is in the traffic path. B.Only one active interface is required. C.Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS. D.When malicious traffic is detected,the IPS will only send an alert to a management station.
A.The IDS is in the traffic path. B.The IDS can send TCP resets to the source device. C.The IDS can send TCP resets to the destination device. D.The IDS listens promiscuously to all traffic on the network. E.Default operation is for the IDS to discard malicious traffic.