Which of the following should be used in place of these devices to prevent future attacks?

An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack .

Which of the following should be used in place of these devices to prevent future attacks?
A . A network tap
B . A proxy server
C . A UTM appliance
D . A content filter

Answer: C

Latest N10-008 Dumps Valid Version with 132 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments