A company has proprietary mission critical devices connected to their network which are configured remotely by both employees and approved customers. The administrator wants to monitor device security without changing their baseline configuration. Which of the following should be implemented to secure the devices without risking availability?

A. Host-based firewall
B. IDS
C. IPS
D. Honeypot


Answer: B. IDS

Computer Science & Information Technology

You might also like to view...

The smallest unit in a binary system is a _____ ,

A. bit B. byte

Computer Science & Information Technology

The term used for certified 802.11b products is ___________ .

A. WAP B. Wi-Fi C. WEP D. WPA

Computer Science & Information Technology

What is Form method=“get”?

What will be an ideal response?

Computer Science & Information Technology

The Compound Path command is found on the ____________________ menu.     

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology