What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
A.
Tapping interrogation replicates signals to a separate port for analyzing traffic
B.
Tapping interrogations detect and block malicious traffic
C.
Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
D.
Inline interrogation detects malicious traffic but does not block the traffic
Traffic tapping involves replicating network traffic and sending it to a separate port where it can be analyzed without affecting the original traffic flow. This allows security analysts to monitor and analyze traffic for potential threats without the risk of blocking legitimate traffic.
This explanation is based on general network security concepts, as the current page does not provide specific Cisco documentation.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit