A. reliability B. scalability C. redundancy D. manageability
A. An IPS should be deployed if the security policy does not support the denial of traffic. B. An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet. C. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet. D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
A.peer-to-peer B. hub and spoke C.partial mesh D.full mesh