200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
- A . Tapping interrogation replicates signals to a separate port for analyzing traffic
- B . Tapping interrogations detect and block malicious traffic
- C . Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
- D . Inline interrogation detects malicious traffic but does not block the traffic