Hmm, tough choice. I'd say B and E, but I'm tempted to pick C just to see the look on the examiner's face. 'Application-layer traffic inspection? In my WIPS? It's more likely than you think.'
I'd go with B and C. Wireless vulnerability assessment and application-level traffic inspection are key WIPS capabilities. The other options don't seem as relevant.
B and E, definitely. WIPS is all about assessing wireless vulnerabilities and enforcing security policies. Configuration distribution and CPU utilization aren't really part of the core functionality.
Jesusa
2 months agoAnnette
2 months agoAmie
28 days agoBeth
29 days agoChandra
1 months agoFlorencia
2 months agoBo
2 months agoSarah
2 months agoRosalind
1 months agoLinsey
1 months agoMarti
2 months agoKimberlie
2 months agoDarrel
2 months agoValda
26 days agoErick
1 months agoKimberely
1 months agoLai
2 months agoAdria
3 months agoEvan
3 months agoDierdre
2 months agoFelicitas
2 months agoIlona
2 months agoJaleesa
3 months agoMaricela
2 months agoLasandra
2 months agoShelton
2 months agoDeeanna
2 months agoDaniela
3 months agoMarkus
3 months agoMarisha
3 months ago