Multiple Choice
____ sensors are typically intended for network perimeter use,so they would be deployed in close proximity to the perimeter firewalls,often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.
A) Inline
B) Offline
C) Passive
D) Bypass
Correct Answer:

Verified
Correct Answer:
Verified
Q1: The attack _ is a series of
Q4: Your organization's operational goals, constraints, and culture
Q6: A(n) _ system contains pseudo-services that emulate
Q8: A(n) _ vulnerability scanner is one that
Q32: Services using the TCP/IP protocol can run
Q36: A passive response is a definitive action
Q39: The trap is a process by which
Q42: Most NBA sensors can be deployed in
Q61: <u>Fingerprinting</u> is the organized research of the
Q70: Preconfigured, predetermined attack patterns are called <u>signatures</u>.