Hmm, tough choice. I'd say B and E, but I'm tempted to pick C just to see the look on the examiner's face. 'Application-layer traffic inspection? In my WIPS? It's more likely than you think.'
I'd go with B and C. Wireless vulnerability assessment and application-level traffic inspection are key WIPS capabilities. The other options don't seem as relevant.
B and E, definitely. WIPS is all about assessing wireless vulnerabilities and enforcing security policies. Configuration distribution and CPU utilization aren't really part of the core functionality.
Dick
4 months agoJill
5 months agoMaddie
5 months agoKristal
5 months agoSonia
5 months agoBen
6 months agoMattie
6 months agoStephane
6 months agoAnnamae
6 months agoNu
6 months agoDottie
6 months agoWerner
6 months agoMaryann
6 months agoIsreal
6 months agoAnnelle
6 months agoJesusa
1 year agoAnnette
2 years agoAmie
1 year agoBeth
1 year agoChandra
1 year agoFlorencia
2 years agoBo
2 years agoSarah
2 years agoRosalind
1 year agoLinsey
1 year agoMarti
1 year agoKimberlie
2 years agoDarrel
2 years agoValda
1 year agoErick
1 year agoKimberely
1 year agoLai
1 year agoAdria
2 years agoEvan
2 years agoDierdre
1 year agoFelicitas
2 years agoIlona
2 years agoJaleesa
2 years agoMaricela
1 year agoLasandra
1 year agoShelton
1 year agoDeeanna
2 years agoDaniela
2 years agoMarkus
2 years agoMarisha
2 years ago