What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?

What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?A . Host-based firewallB . Web proxyC . Endpoint Detection and ResponseD . Intrusion Detection SystemView AnswerAnswer: D

January 30, 2025 No Comments READ MORE +