You are the Network Administrator for a large corporate network. You want to monitor all network
traffic on your local network for suspicious activities and receive a notification when a possible
attack is in process. Which of the following actions will you take for this?
A.
Install a network-based IDS
B.
Install a host-based IDS
C.
Install a DMZ firewall
D.
Enable verbose logging on the firewall