Okay, let me walk through this step-by-step. The engineer has already set up the passive-interface and SPAN on the switch, so the next step must be to configure the intrusion policy on the Secure Firewall Threat Defense device to actually inspect the traffic and act as an IDS. I think A is the right answer here.
This seems like a pretty straightforward TOGAF implementation question. I'd start by carefully reading through the scenario and understanding the key details - the lack of enterprise architecture, the need to expand to new markets, and the newly formed Architecture Board. I think option C looks like the best approach, focusing on clarifying the business drivers, requirements, and principles with the board.
Jin
4 months agoMiles
4 months agoPok
4 months agoWeldon
4 months agoAhmed
4 months agoMaryanne
5 months agoFatima
5 months agoNatalie
5 months agoLelia
5 months agoMose
5 months agoNoe
5 months agoAilene
5 months ago