- All Exams Instant Download
Which of the following should be used in place of these devices to prevent future attacks?
An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack . Which of the following should be used in place of these devices to prevent future attacks?A . A network tapB . A proxy...