A.Top-secret B.Confidential C.SBU D.Secret
A.Host-based IPS can work in promiscuous mode or inline mode. B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers. C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows. D.Host-based IPS deployment requires less planning than network-based IPS.
A.HMAC B.RSA C.MD5 D.SHA-1