Hmm, tough choice. I'd say B and E, but I'm tempted to pick C just to see the look on the examiner's face. 'Application-layer traffic inspection? In my WIPS? It's more likely than you think.'
I'd go with B and C. Wireless vulnerability assessment and application-level traffic inspection are key WIPS capabilities. The other options don't seem as relevant.
B and E, definitely. WIPS is all about assessing wireless vulnerabilities and enforcing security policies. Configuration distribution and CPU utilization aren't really part of the core functionality.
Jesusa
24 days agoAnnette
27 days agoChandra
5 days agoFlorencia
1 months agoBo
1 months agoSarah
1 months agoRosalind
6 days agoLinsey
16 days agoMarti
24 days agoKimberlie
1 months agoDarrel
1 months agoErick
5 days agoKimberely
9 days agoLai
21 days agoAdria
2 months agoEvan
2 months agoDierdre
22 days agoFelicitas
1 months agoIlona
1 months agoJaleesa
2 months agoMaricela
20 days agoLasandra
23 days agoShelton
23 days agoDeeanna
29 days agoDaniela
2 months agoMarkus
2 months agoMarisha
2 months ago