What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?
- A.Host-based firewall
- B.Web proxy
- C.Endpoint Detection and Response
- D.Intrusion Detection System
Sign in to track wrong answers, get spaced-repetition reminders, and run timed exam mode.