How are application layer attacks mitigated in the SAFE SMR midsize network design corporate
Internet module?
A.
CAR at the ISP edge and TCP setup controls at the firewall
B.
e-mail content filtering, HIDS, and host-based virus scanning
C.
IDS at the host and network levels
D.
OS and IDS detection
E.
filtering at the ISP, edge router, and corporate firewall