A. HP Network Protector uses anomaly-based threat detection so that it can detect zeroday threats.
B. HP Network Protector detects threats based on custom blacklists exclusively, preventing false positives.
C. HP Network Protector is deployed on a hardware appliance that sits inline between a protected and unprotected zone.
D. HP Network Protector dynamically programs the network to drop malicious traffic at the point of connection.
Answer: D

A. A
B. B
C. C
D. D
Answer: B
No comments:
Post a Comment
Note: only a member of this blog may post a comment.