List of questions
Related questions
Question 127 - N10-008 discussion
An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack. Which of the following should be used in place of these devices to prevent future attacks?
A.
A network tap
B.
A proxy server
C.
A UTM appliance
D.
A content filter
Your answer:
0 comments
Sorted by
Leave a comment first