Размер видео: 1280 X 720853 X 480640 X 360
Показать панель управления
Автовоспроизведение
Автоповтор
Thanks Professor Messer, I'm halfway through this now and it's been looking good. Keen to see this playlist through and pass the Security+.
Grateful for your service, Prof Messer!
Question: what precaution will be taken if a duplicated copy identified malicious in IPS? as the other copy was already sent to the endpoint user
Question. Why does one use an IPS for an IDS like design when you can just use an IDS for it?
I think it's because an IDS doesn't prevent anything. It's more of a notification system unlike an IPS which actually stops threats.
Listen closely from 2:40 and on
🐐
Thanks Professor Messer, I'm halfway through this now and it's been looking good.
Keen to see this playlist through and pass the Security+.
Grateful for your service, Prof Messer!
Question: what precaution will be taken if a duplicated copy identified malicious in IPS? as the other copy was already sent to the endpoint user
Question. Why does one use an IPS for an IDS like design when you can just use an IDS for it?
I think it's because an IDS doesn't prevent anything. It's more of a notification system unlike an IPS which actually stops threats.
Listen closely from 2:40 and on
🐐