Hmm, tough choice. I'd say B and E, but I'm tempted to pick C just to see the look on the examiner's face. 'Application-layer traffic inspection? In my WIPS? It's more likely than you think.'
I'd go with B and C. Wireless vulnerability assessment and application-level traffic inspection are key WIPS capabilities. The other options don't seem as relevant.
B and E, definitely. WIPS is all about assessing wireless vulnerabilities and enforcing security policies. Configuration distribution and CPU utilization aren't really part of the core functionality.
Dick
3 months agoJill
3 months agoMaddie
3 months agoKristal
4 months agoSonia
4 months agoBen
4 months agoMattie
4 months agoStephane
4 months agoAnnamae
5 months agoNu
5 months agoDottie
5 months agoWerner
5 months agoMaryann
5 months agoIsreal
5 months agoAnnelle
5 months agoJesusa
1 year agoAnnette
1 year agoAmie
1 year agoBeth
1 year agoChandra
1 year agoFlorencia
1 year agoBo
1 year agoSarah
1 year agoRosalind
1 year agoLinsey
1 year agoMarti
1 year agoKimberlie
1 year agoDarrel
1 year agoValda
1 year agoErick
1 year agoKimberely
1 year agoLai
1 year agoAdria
1 year agoEvan
1 year agoDierdre
1 year agoFelicitas
1 year agoIlona
1 year agoJaleesa
1 year agoMaricela
1 year agoLasandra
1 year agoShelton
1 year agoDeeanna
1 year agoDaniela
1 year agoMarkus
1 year agoMarisha
1 year ago