Certified Ethical Hacker – CEH – 312-50 – Question162

Which of the following does proper basic configuration of snort as a network intrusion detection system require?


A.
Limit the packets captured to the snort configuration file.
B. Capture every packet on the network segment.
C. Limit the packets captured to a single segment.
D. Limit the packets captured to the /var/log/snort directory.

Correct Answer: A