List of questions
Related questions
Question 31 - SPLK-5001 discussion
What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?
A.
Host-based firewall
B.
Web proxy
C.
Endpoint Detection and Response
D.
Intrusion Detection System
Your answer:
0 comments
Sorted by
Leave a comment first