Hmm, tough choice. I'd say B and E, but I'm tempted to pick C just to see the look on the examiner's face. 'Application-layer traffic inspection? In my WIPS? It's more likely than you think.'
I'd go with B and C. Wireless vulnerability assessment and application-level traffic inspection are key WIPS capabilities. The other options don't seem as relevant.
B and E, definitely. WIPS is all about assessing wireless vulnerabilities and enforcing security policies. Configuration distribution and CPU utilization aren't really part of the core functionality.
Jesusa
8 months agoAnnette
8 months agoAmie
7 months agoBeth
7 months agoChandra
7 months agoFlorencia
8 months agoBo
8 months agoSarah
8 months agoRosalind
7 months agoLinsey
8 months agoMarti
8 months agoKimberlie
8 months agoDarrel
8 months agoValda
7 months agoErick
7 months agoKimberely
7 months agoLai
8 months agoAdria
9 months agoEvan
9 months agoDierdre
8 months agoFelicitas
8 months agoIlona
8 months agoJaleesa
9 months agoMaricela
8 months agoLasandra
8 months agoShelton
8 months agoDeeanna
8 months agoDaniela
9 months agoMarkus
9 months agoMarisha
9 months ago