What three actions are limitations when running IPS in promiscuous mode? (Choose three.)
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
What is an advantage of implementing a Trusted Platform Module for disk encryption?
What is the purpose of the Integrity component of the CIA triad?
In a security context, which action can you take to address compliance?
Which two services define cloud networks? (Choose two.)