Site icon Exam4Training

What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?

What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?
A . Host-based firewall
B . Web proxy
C . Endpoint Detection and Response
D . Intrusion Detection System

Answer: D

Exit mobile version