Hmm, tough choice. I'd say B and E, but I'm tempted to pick C just to see the look on the examiner's face. 'Application-layer traffic inspection? In my WIPS? It's more likely than you think.'
I'd go with B and C. Wireless vulnerability assessment and application-level traffic inspection are key WIPS capabilities. The other options don't seem as relevant.
B and E, definitely. WIPS is all about assessing wireless vulnerabilities and enforcing security policies. Configuration distribution and CPU utilization aren't really part of the core functionality.
Jesusa
4 months agoAnnette
4 months agoAmie
4 months agoBeth
4 months agoChandra
4 months agoFlorencia
5 months agoBo
5 months agoSarah
5 months agoRosalind
4 months agoLinsey
4 months agoMarti
4 months agoKimberlie
5 months agoDarrel
5 months agoValda
3 months agoErick
4 months agoKimberely
4 months agoLai
4 months agoAdria
5 months agoEvan
5 months agoDierdre
4 months agoFelicitas
5 months agoIlona
5 months agoJaleesa
5 months agoMaricela
4 months agoLasandra
4 months agoShelton
4 months agoDeeanna
5 months agoDaniela
5 months agoMarkus
5 months agoMarisha
5 months ago