Notifications
Clear all
Topic starter
05/07/2022 4:40 am
An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack .
Which of the following should be used in place of these devices to prevent future attacks?
- A . A network tap
- B . A proxy server
- C . A UTM appliance
- D . A content filter
Suggested Answer: C