Hmm, tough choice. I'd say B and E, but I'm tempted to pick C just to see the look on the examiner's face. 'Application-layer traffic inspection? In my WIPS? It's more likely than you think.'
I'd go with B and C. Wireless vulnerability assessment and application-level traffic inspection are key WIPS capabilities. The other options don't seem as relevant.
B and E, definitely. WIPS is all about assessing wireless vulnerabilities and enforcing security policies. Configuration distribution and CPU utilization aren't really part of the core functionality.
Jesusa
8 months agoAnnette
8 months agoAmie
7 months agoBeth
7 months agoChandra
8 months agoFlorencia
8 months agoBo
8 months agoSarah
9 months agoRosalind
8 months agoLinsey
8 months agoMarti
8 months agoKimberlie
9 months agoDarrel
9 months agoValda
7 months agoErick
8 months agoKimberely
8 months agoLai
8 months agoAdria
9 months agoEvan
9 months agoDierdre
8 months agoFelicitas
9 months agoIlona
9 months agoJaleesa
9 months agoMaricela
8 months agoLasandra
8 months agoShelton
8 months agoDeeanna
8 months agoDaniela
9 months agoMarkus
9 months agoMarisha
9 months ago