Hmm, tough choice. I'd say B and E, but I'm tempted to pick C just to see the look on the examiner's face. 'Application-layer traffic inspection? In my WIPS? It's more likely than you think.'
I'd go with B and C. Wireless vulnerability assessment and application-level traffic inspection are key WIPS capabilities. The other options don't seem as relevant.
B and E, definitely. WIPS is all about assessing wireless vulnerabilities and enforcing security policies. Configuration distribution and CPU utilization aren't really part of the core functionality.
Jesusa
2 months agoAnnette
2 months agoAmie
1 months agoBeth
1 months agoChandra
2 months agoFlorencia
2 months agoBo
3 months agoSarah
3 months agoRosalind
2 months agoLinsey
2 months agoMarti
2 months agoKimberlie
3 months agoDarrel
3 months agoValda
1 months agoErick
2 months agoKimberely
2 months agoLai
2 months agoAdria
3 months agoEvan
3 months agoDierdre
2 months agoFelicitas
3 months agoIlona
3 months agoJaleesa
3 months agoMaricela
2 months agoLasandra
2 months agoShelton
2 months agoDeeanna
2 months agoDaniela
3 months agoMarkus
3 months agoMarisha
3 months ago