200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?

  • A . Tapping interrogation replicates signals to a separate port for analyzing traffic
  • B . Tapping interrogations detect and block malicious traffic
  • C . Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
  • D . Inline interrogation detects malicious traffic but does not block the traffic
Answer: Option A.

No answer description available for this question.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
error: Alert: Content is protected !!

Adblock Detected

Please consider supporting us by disabling your ad blocker