An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack .
Which of the following should be used in place of these devices to prevent future attacks?
A . A network tap
B . A proxy server
C . A UTM appliance
D . A content filter
Answer: C
Latest N10-008 Dumps Valid Version with 132 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund