Which of the following devices would BEST meet all of these requirements?

An IT administrator has been tasked by the Chief Executive Officer with implementing security
using a single device based on the following requirements:
1. Selective sandboxing of suspicious code to determine malicious intent.
2. VoIP handling for SIP and H.323 connections.
3. Block potentially unwanted applications.
Which of the following devices would BEST meet all of these requirements?

An IT administrator has been tasked by the Chief Executive Officer with implementing security
using a single device based on the following requirements:
1. Selective sandboxing of suspicious code to determine malicious intent.
2. VoIP handling for SIP and H.323 connections.
3. Block potentially unwanted applications.
Which of the following devices would BEST meet all of these requirements?

A.
UTM

B.
HIDS

C.
NIDS

D.
WAF

E.
HSM



Leave a Reply 0

Your email address will not be published. Required fields are marked *