What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?
What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?A . Host-based firewallB . Web proxyC . Endpoint Detection and ResponseD . Intrusion Detection SystemView AnswerAnswer: D