Hmm, tough choice. I'd say B and E, but I'm tempted to pick C just to see the look on the examiner's face. 'Application-layer traffic inspection? In my WIPS? It's more likely than you think.'
I'd go with B and C. Wireless vulnerability assessment and application-level traffic inspection are key WIPS capabilities. The other options don't seem as relevant.
B and E, definitely. WIPS is all about assessing wireless vulnerabilities and enforcing security policies. Configuration distribution and CPU utilization aren't really part of the core functionality.
Jesusa
6 months agoAnnette
6 months agoAmie
5 months agoBeth
5 months agoChandra
5 months agoFlorencia
6 months agoBo
6 months agoSarah
6 months agoRosalind
6 months agoLinsey
6 months agoMarti
6 months agoKimberlie
7 months agoDarrel
7 months agoValda
5 months agoErick
5 months agoKimberely
6 months agoLai
6 months agoAdria
7 months agoEvan
7 months agoDierdre
6 months agoFelicitas
7 months agoIlona
7 months agoJaleesa
7 months agoMaricela
6 months agoLasandra
6 months agoShelton
6 months agoDeeanna
6 months agoDaniela
7 months agoMarkus
7 months agoMarisha
7 months ago