Which of the following does proper basic configuration of snort as a network intrusion detection system require?
Limit the packets captured to the snort configuration file.
Capture every packet on the network segment.
Limit the packets captured to a single segment.
Limit the packets captured to the /var/log/snort directory.
Submit