Review the IPS sensor filter configuration shown in the exhibit.
Based on the information in the exhibit, which statements are correct regarding the filter? (Choose
It does not log attacks targeting Linux servers.
It matches all traffic to Linux servers.
Its action will block traffic matching these signatures.
It only takes affect when the sensor is applied to a policy.