Which of the following should be used in place of these devices to prevent future attacks?

An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack . Which of the following should be used in place of these devices to prevent future attacks?A . A network tapB . A proxy...

October 27, 2021 No Comments READ MORE +