What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?

What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?
A . Host-based firewall
B . Web proxy
C . Endpoint Detection and Response
D . Intrusion Detection System

Answer: D

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments