A. reliability B. scalability C. redundancy D. manageability
A. An IPS should be deployed if the security policy does not support the denial of traffic. B. An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet. C. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet. D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class. B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions. C. Use class-based policing to limit the peer-to-peer traffic rate. D. Use class-based shaping to delay any excessive peer-to-peer traffic.